search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Archive::Zip may not properly parse the file sizes of Zip archives

Vulnerability Note VU#492545

Original Release Date: 2004-11-12 | Last Revised: 2004-11-15


Archive::Zip does not properly parse Zip files and may incorrectly interpret malformed zip archives to contain zero length/size files. As a a result, anti-virus software using Archive::Zip may fail to detect malicious content within a Zip archive.


The Archive::Zip module allows PERL programs to manipulate Zip archives. An attacker may be able to create a specially crafted Zip archive that could cause Archive::Zip to interpret files in the archive as having zero length. If anti-virus software is using Archive::Zip to scan Zip attachments, it may fail to detect the malicious content and allow the archive into the system.


A remote attacker may be able to craft a malicious Zip archive that will evade detection by anti-virus software using Archive::Zip. Once in the system, if the remote attacker can persuade the user to accesses the malicious archive, the attacker may be able to execute arbitrary code on that user's system, possibly with administrator privileges.


Upgrade Archive::Zip

This issue has been addressed in Archive::Zip version 1.4.

Vendor Information


CPAN Affected

Updated:  November 12, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was publicly reported by iDefense.

This document was written by Jeff Gennari.

Other Information

CVE IDs: None
Severity Metric: 3.59
Date Public: 2004-10-18
Date First Published: 2004-11-12
Date Last Updated: 2004-11-15 15:35 UTC
Document Revision: 131

Sponsored by CISA.