CVE-2024-13941
📋 TL;DR
This is a critical memory corruption vulnerability in the ouch archive utility's ZIP date-time parsing function. Attackers with local access can exploit it to potentially execute arbitrary code or crash the application. Users of ouch versions up to 0.3.1 are affected.
💻 Affected Systems
- ouch-org ouch
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to arbitrary code execution with the privileges of the ouch process
Likely Case
Application crash (denial of service) or limited memory corruption
If Mitigated
No impact if patched or if untrusted users lack local access
🎯 Exploit Status
Exploit requires local access and ability to trigger ZIP date-time parsing with malicious input
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.4.0
Vendor Advisory: https://github.com/ouch-org/ouch/releases/tag/0.4.0
Restart Required: No
Instructions:
1. Check current ouch version: ouch --version
2. Update via cargo: cargo install ouch --version 0.4.0
3. Verify update: ouch --version should show 0.4.0
🔧 Temporary Workarounds
Restrict local user access
linuxLimit which users can execute ouch on vulnerable systems
chmod 750 /usr/local/bin/ouch
setfacl -m u:trusteduser:rx /usr/local/bin/ouch
Avoid processing untrusted ZIP files
allDo not use ouch to extract or process ZIP archives from untrusted sources
🧯 If You Can't Patch
- Remove ouch from production systems or restrict to trusted users only
- Use alternative archive tools for ZIP processing
🔍 How to Verify
Check if Vulnerable:
Run: ouch --version | grep -E '0\.(0|1|2|3)\.[0-9]+'
Check Version:
ouch --version
Verify Fix Applied:
Run: ouch --version | grep '0.4.0'
📡 Detection & Monitoring
Log Indicators:
- Segmentation fault or crash reports from ouch process
- Unexpected termination of ouch with memory error codes
Network Indicators:
- None - local exploitation only
SIEM Query:
process.name:"ouch" AND (event.action:"segmentation_fault" OR event.outcome:"failure")
🔗 References
- https://github.com/ouch-org/ouch/issues/707
- https://github.com/ouch-org/ouch/releases/tag/0.4.0
- https://github.com/rustsec/advisory-db/pull/2084/files
- https://github.com/user-attachments/files/16767988/ouch.crash.report.docx
- https://vuldb.com/?ctiid.302055
- https://vuldb.com/?id.302055
- https://vuldb.com/?submit.524511
- https://github.com/ouch-org/ouch/issues/707