Executive Summary
Summary | |
---|---|
Title | New gzip packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-1974 | First vendor Publication | 2010-01-20 |
Vendor | Debian | Last vendor Modification | 2010-01-20 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been found in gzip, the GNU compression utilities. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2624 Thiemo Nagel discovered a missing input sanitation flaw in the way gzip used to decompress data blocks for dynamic Huffman codes, which could lead to the execution of arbitrary code when trying to decompress a crafted archive. This issue is a reappearance of CVE-2006-4334 and only affects the lenny version. CVE-2010-0001 Aki Helin discovered an integer underflow when decompressing files that are compressed using the LZW algorithm. This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive. For the stable distribution (lenny), these problems have been fixed in version 1.3.12-6+lenny1. For the oldstable distribution (etch), these problems have been fixed in version 1.3.5-15+etch1. For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your gzip packages. |
Original Source
Url : http://www.debian.org/security/2010/dsa-1974 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10527 | |||
Oval ID: | oval:org.mitre.oval:def:10527 | ||
Title: | Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference. | ||
Description: | Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-4334 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10546 | |||
Oval ID: | oval:org.mitre.oval:def:10546 | ||
Title: | Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. | ||
Description: | Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0001 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13018 | |||
Oval ID: | oval:org.mitre.oval:def:13018 | ||
Title: | DSA-1974-1 gzip -- several | ||
Description: | Several vulnerabilities have been found in gzip, the GNU compression utilities. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2624 Thiemo Nagel discovered a missing input sanitation flaw in the way gzip used to decompress data blocks for dynamic Huffman codes, which could lead to the execution of arbitrary code when trying to decompress a crafted archive. This issue is a reappearance of CVE-2006-4334 and only affects the lenny version. CVE-2010-0001 Aki Helin discovered an integer underflow when decompressing files that are compressed using the LZW algorithm. This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive. For the stable distribution, these problems have been fixed in version 1.3.12-6+lenny1. For the oldstable distribution, these problems have been fixed in version 1.3.5-15+etch1. For the testing distribution and the unstable distribution, these problems will be fixed soon. We recommend that you upgrade your gzip packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1974-1 CVE-2009-2624 CVE-2010-0001 CVE-2006-4334 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | gzip |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13325 | |||
Oval ID: | oval:org.mitre.oval:def:13325 | ||
Title: | USN-889-1 -- gzip vulnerabilities | ||
Description: | It was discovered that gzip incorrectly handled certain malformed compressed files. If a user or automated system were tricked into opening a specially crafted gzip file, an attacker could cause gzip to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Aki Helin discovered that gzip incorrectly handled certain malformed files compressed with the Lempel–Ziv–Welch algorithm. If a user or automated system were tricked into opening a specially crafted gzip file, an attacker could cause gzip to crash or possibly execute arbitrary code with the privileges of the user invoking the program | ||
Family: | unix | Class: | patch |
Reference(s): | USN-889-1 CVE-2009-2624 CVE-2010-0001 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 8.10 Ubuntu 9.10 Ubuntu 6.06 Ubuntu 9.04 | Product(s): | gzip |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13583 | |||
Oval ID: | oval:org.mitre.oval:def:13583 | ||
Title: | DSA-2074-1 ncompress -- integer underflow | ||
Description: | Aki Helin discovered an integer underflow in ncompress, the original Lempel-Ziv compress/uncompress programs. This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive. For the stable distribution, this problem has been fixed in version 4.2.4.2-1+lenny1. For the testing and unstable distribution, this problem has been fixed in version 4.2.4.3-1. We recommend that you upgrade your ncompress package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2074-1 CVE-2010-0001 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | ncompress |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19687 | |||
Oval ID: | oval:org.mitre.oval:def:19687 | ||
Title: | HP-UX Running Software Distributor (SD), Remote Denial of Service (DoS) | ||
Description: | Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-4334 | Version: | 8 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22121 | |||
Oval ID: | oval:org.mitre.oval:def:22121 | ||
Title: | RHSA-2010:0061: gzip security update (Moderate) | ||
Description: | Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0061-02 CESA-2010:0061 CVE-2010-0001 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | gzip |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23003 | |||
Oval ID: | oval:org.mitre.oval:def:23003 | ||
Title: | ELSA-2010:0061: gzip security update (Moderate) | ||
Description: | Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0061-02 CVE-2010-0001 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | gzip |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7495 | |||
Oval ID: | oval:org.mitre.oval:def:7495 | ||
Title: | DSA-1974 gzip -- several vulnerabilities | ||
Description: | Several vulnerabilities have been found in gzip, the GNU compression utilities. The Common Vulnerabilities and Exposures project identifies the following problems: Thiemo Nagel discovered a missing input sanitation flaw in the way gzip used to decompress data blocks for dynamic Huffman codes, which could lead to the execution of arbitrary code when trying to decompress a crafted archive. This issue is a reappearance of CVE-2006-4334 and only affects the lenny version. Aki Helin discovered an integer underflow when decompressing files that are compressed using the LZW algorithm. This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1974 CVE-2009-2624 CVE-2010-0001 CVE-2006-4334 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | gzip |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7511 | |||
Oval ID: | oval:org.mitre.oval:def:7511 | ||
Title: | gzip Integer Overflow Vulnerability | ||
Description: | Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0001 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-04-16 | Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates File : nvt/gb_VMSA-2010-0009.nasl |
2011-10-21 | Name : Mandriva Update for ncompress MDVSA-2011:152 (ncompress) File : nvt/gb_mandriva_MDVSA_2011_152.nasl |
2011-09-07 | Name : Mac OS X v10.6.4 Multiple Vulnerabilities (2010-007) File : nvt/gb_macosx_su10-007.nasl |
2011-08-09 | Name : CentOS Update for gzip CESA-2010:0061 centos5 i386 File : nvt/gb_CESA-2010_0061_gzip_centos5_i386.nasl |
2010-08-21 | Name : Debian Security Advisory DSA 2074-1 (ncompress) File : nvt/deb_2074_1.nasl |
2010-03-02 | Name : Fedora Update for gzip FEDORA-2010-0964 File : nvt/gb_fedora_2010_0964_gzip_fc11.nasl |
2010-03-02 | Name : Fedora Update for gzip FEDORA-2010-0884 File : nvt/gb_fedora_2010_0884_gzip_fc12.nasl |
2010-02-04 | Name : GZip 'huft_build()' in 'inflate.c' Input Validation Vulnerability (Linux) File : nvt/gb_gzip_inflate_dos_vuln_lin.nasl |
2010-02-04 | Name : GZip 'huft_build()' in 'inflate.c' Input Validation Vulnerability (Win) File : nvt/gb_gzip_inflate_dos_vuln_win.nasl |
2010-02-01 | Name : Debian Security Advisory DSA 1974-1 (gzip) File : nvt/deb_1974_1.nasl |
2010-01-29 | Name : SuSE Update for acroread SUSE-SA:2010:008 File : nvt/gb_suse_2010_008.nasl |
2010-01-25 | Name : RedHat Update for gzip RHSA-2010:0061-02 File : nvt/gb_RHSA-2010_0061-02_gzip.nasl |
2010-01-22 | Name : CentOS Update for gzip CESA-2010:0061 centos3 x86_64 File : nvt/gb_CESA-2010_0061_gzip_centos3_x86_64.nasl |
2010-01-22 | Name : CentOS Update for gzip CESA-2010:0061 centos3 i386 File : nvt/gb_CESA-2010_0061_gzip_centos3_i386.nasl |
2010-01-22 | Name : Mandriva Update for gzip MDVSA-2010:020 (gzip) File : nvt/gb_mandriva_MDVSA_2010_020.nasl |
2010-01-22 | Name : Ubuntu Update for gzip vulnerabilities USN-889-1 File : nvt/gb_ubuntu_USN_889_1.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-10 | Name : SLES9: Security update for gzip File : nvt/sles9p5012976.nasl |
2009-06-03 | Name : Solaris Update for SunFreeware gzip 120719-02 File : nvt/gb_solaris_120719_02.nasl |
2009-06-03 | Name : Solaris Update for SunFreeware gzip 120720-02 File : nvt/gb_solaris_120720_02.nasl |
2009-05-05 | Name : HP-UX Update for Software Distributor (SD) HPSBUX02195 File : nvt/gb_hp_ux_HPSBUX02195.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200609-13 (gzip) File : nvt/glsa_200609_13.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-06:21.gzip.asc) File : nvt/freebsdsa_gzip1.nasl |
2008-09-04 | Name : FreeBSD Ports: gzip File : nvt/freebsd_gzip0.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2006-262-01 gzip File : nvt/esoft_slk_ssa_2006_262_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
61875 | GNU gzip inflate.c huft_build() Function Infinite Loop DoS |
61869 | GNU gzip unlzw.c unlzw() Function LZW File Handling Underflow |
29004 | gzip Unspecified NULL Dereference DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-08 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2010-0009_remote.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_gzip_20141107.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-08.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2010-0061.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2006-0667.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20100120_gzip_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2011-10-18 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2011-152.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes security issues. File : macosx_SecUpd2010-007.nasl - Type : ACT_GATHER_INFO |
2010-11-10 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_5.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_gzip-6793.nasl - Type : ACT_GATHER_INFO |
2010-07-22 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2074.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0964.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0884.nasl - Type : ACT_GATHER_INFO |
2010-06-01 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2010-0009.nasl - Type : ACT_GATHER_INFO |
2010-03-02 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-060-03.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1974.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_gzip-100120.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_gzip-6792.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_gzip-100120.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_gzip-100120.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_gzip-100120.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12573.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0061.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0061.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-889-1.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2010-020.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11220.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_gzip-2085.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-349-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_gzip-2084.nasl - Type : ACT_GATHER_INFO |
2007-09-25 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHCO_35587.nasl - Type : ACT_GATHER_INFO |
2007-06-07 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_11a840928f9f11dbab33000e0c2e438a.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2006-167.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-989.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1181.nasl - Type : ACT_GATHER_INFO |
2006-09-27 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200609-13.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2006-262-01.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0667.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0667.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:29:09 |
|
2013-05-11 00:43:40 |
|