{"id":"UBUNTU-CVE-2018-17828","details":"Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.","modified":"2026-04-22T12:59:29.599505Z","published":"2018-10-01T08:29:00Z","upstream":["CVE-2018-17828"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17828"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-17828"}],"affected":[{"package":{"name":"zziplib","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/zziplib@0.13.62-3ubuntu0.16.04.2+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.62-3","0.13.62-3ubuntu0.16.04.1","0.13.62-3ubuntu0.16.04.2","0.13.62-3ubuntu0.16.04.2+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13","binary_version":"0.13.62-3ubuntu0.16.04.2+esm1"},{"binary_name":"zziplib-bin","binary_version":"0.13.62-3ubuntu0.16.04.2+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}},{"package":{"name":"zziplib","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/zziplib@0.13.62-3.1ubuntu0.18.04.1+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.62-3.1","0.13.62-3.1ubuntu0.18.04.1","0.13.62-3.1ubuntu0.18.04.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13","binary_version":"0.13.62-3.1ubuntu0.18.04.1+esm1"},{"binary_name":"zziplib-bin","binary_version":"0.13.62-3.1ubuntu0.18.04.1+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}},{"package":{"name":"zziplib","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/zziplib@0.13.62-3.2ubuntu1.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.62-3.2","0.13.62-3.2ubuntu1","0.13.62-3.2ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13","binary_version":"0.13.62-3.2ubuntu1.1"},{"binary_name":"zziplib-bin","binary_version":"0.13.62-3.2ubuntu1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}},{"package":{"name":"zziplib","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/zziplib@0.13.72+dfsg.1-1.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.72+dfsg.1-1.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13","binary_version":"0.13.72+dfsg.1-1.1"},{"binary_name":"zziplib-bin","binary_version":"0.13.72+dfsg.1-1.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}},{"package":{"name":"zziplib","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/zziplib@0.13.72+dfsg.1-1.2build1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.72+dfsg.1-1.1","0.13.72+dfsg.1-1.2","0.13.72+dfsg.1-1.2build1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13t64","binary_version":"0.13.72+dfsg.1-1.2build1"},{"binary_name":"zziplib-bin","binary_version":"0.13.72+dfsg.1-1.2build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}},{"package":{"name":"zziplib","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/zziplib@0.13.78+dfsg.1-0.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.13.78+dfsg.1-0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libzzip-0-13t64","binary_version":"0.13.78+dfsg.1-0.1"},{"binary_name":"zziplib-bin","binary_version":"0.13.78+dfsg.1-0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17828.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"negligible"}]}