Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-994-1 | zziplib security update |
Debian DSA |
DSA-3878-1 | zziplib security update |
EUVD |
EUVD-2017-15044 | Heap-based buffer overflow in the __zzip_get64 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file. |
Ubuntu USN |
USN-3320-1 | zziplib vulnerabilities |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gdraheim
Gdraheim zziplib |
|
| CPEs | cpe:2.3:a:zziplib_project:zziplib:0.13.57:*:*:*:*:*:*:* cpe:2.3:a:zziplib_project:zziplib:0.13.58:*:*:*:*:*:*:* cpe:2.3:a:zziplib_project:zziplib:0.13.59:*:*:*:*:*:*:* cpe:2.3:a:zziplib_project:zziplib:0.13.60:*:*:*:*:*:*:* cpe:2.3:a:zziplib_project:zziplib:0.13.61:*:*:*:*:*:*:* cpe:2.3:a:zziplib_project:zziplib:0.13.62:*:*:*:*:*:*:* |
cpe:2.3:a:gdraheim:zziplib:0.13.56:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.57:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.58:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.59:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.60:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.61:*:*:*:*:*:*:* cpe:2.3:a:gdraheim:zziplib:0.13.62:*:*:*:*:*:*:* |
| Vendors & Products |
Zziplib Project
Zziplib Project zziplib |
Gdraheim
Gdraheim zziplib |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:18:49.570Z
Reserved: 2017-02-13T00:00:00.000Z
Link: CVE-2017-5975
No data.
Status : Modified
Published: 2017-03-01T15:59:01.167
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5975
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN