DEBIAN-CVE-2017-1000472

Source
https://security-tracker.debian.org/tracker/CVE-2017-1000472
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2017-1000472.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2017-1000472
Upstream
Published
2018-01-03T20:29:00Z
Modified
2025-09-30T03:54:18Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".

References

Affected packages

Debian:11 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / poco

Package

Name
poco
Purl
pkg:deb/debian/poco?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}