First published: Tue Sep 19 2006(Updated: )
Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
gzip | =1.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4335 is classified as a moderate severity vulnerability due to its potential for causing denial of service and possibly executing arbitrary code.
To remediate CVE-2006-4335, users should upgrade to a patched version of gzip that addresses the vulnerability.
CVE-2006-4335 specifically affects gzip version 1.3.5, particularly when running on certain platforms.
Yes, CVE-2006-4335 can be exploited by an attacker through a crafted GZIP archive which can trigger the vulnerability.
The consequences of CVE-2006-4335 include the potential for denial of service, which can crash the application, and executing arbitrary code.