In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
2019-09-25T22:15:10.023
2024-11-21T04:31:17.280
Modified
CVSSv3.1: 5.5 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:N/A:C
8.6
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rubyzip_project | rubyzip | < 1.3.0 | Yes |
Operating System | fedoraproject | fedora | 29 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Application | redhat | cloudforms | 4.7 | Yes |
Application | redhat | cloudforms | 5.11 | Yes |