GHSA-5m2v-hc64-56h6

Suggest an improvement
Source
https://github.com/advisories/GHSA-5m2v-hc64-56h6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/09/GHSA-5m2v-hc64-56h6/GHSA-5m2v-hc64-56h6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5m2v-hc64-56h6
Aliases
Published
2019-09-30T16:05:32Z
Modified
2024-02-16T08:20:45.798772Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Rubyzip denial of service
Details

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).

Database specific
{
    "nvd_published_at": "2019-09-25T22:15:10Z",
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2019-09-30T16:04:36Z"
}
References

Affected packages

RubyGems / rubyzip

Package

Name
rubyzip
Purl
pkg:gem/rubyzip

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0

Affected versions

0.*

0.5.7
0.5.8
0.5.9
0.5.11
0.5.12
0.9.1
0.9.4
0.9.5
0.9.6.1
0.9.7
0.9.8
0.9.9

1.*

1.0.0.beta1
1.0.0
1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4