CVE-2019-16892
25.09.2019, 22:15
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).Enginsight
| Vendor | Product | Version |
|---|---|---|
| rubyzip_project | rubyzip | 𝑥 < 1.3.0 |
| redhat | cloudforms | 4.7 |
| redhat | cloudforms | 5.11 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References