Lucene search

K
osvGoogleOSV:DSA-1974-1
HistoryJan 20, 2010 - 12:00 a.m.

gzip - arbitrary code execution

2010-01-2000:00:00
Google
osv.dev
11

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.155 Low

EPSS

Percentile

95.1%

Several vulnerabilities have been found in gzip, the GNU compression
utilities. The Common Vulnerabilities and Exposures project identifies
the following problems:

  • CVE-2009-2624
    Thiemo Nagel discovered a missing input sanitation flaw in the way gzip
    used to decompress data blocks for dynamic Huffman codes, which could
    lead to the execution of arbitrary code when trying to decompress a
    crafted archive. This issue is a reappearance of CVE-2006-4334 and only
    affects the lenny version.
  • CVE-2010-0001
    Aki Helin discovered an integer underflow when decompressing files that
    are compressed using the LZW algorithm. This could lead to the execution
    of arbitrary code when trying to decompress a crafted LZW compressed
    gzip archive.

For the stable distribution (lenny), these problems have been fixed in
version 1.3.12-6+lenny1.

For the oldstable distribution (etch), these problems have been fixed in
version 1.3.5-15+etch1.

For the testing distribution (squeeze) and the unstable distribution
(sid), these problems will be fixed soon.

We recommend that you upgrade your gzip packages.

CPENameOperatorVersion
gzipeq1.3.12-6

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.155 Low

EPSS

Percentile

95.1%