First published: Thu Jul 30 2009(Updated: )
A missing input sanitation flaw was found in the way gzip used to decompress data blocks for dynamic Huffman codes. A remote attacker could provide a specially-crafted gzip compressed data archive, which once opened by a local, unsuspecting user would lead to denial of service (gzip crash) or, potentially, to arbitrary code execution with the privileges of the user running gzip. Upstream patch: --------------- <a href="http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2">http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=39a362ae9d9b007473381dba5032f4dfc1744cf2</a> CVE Note: --------- This flaw reportedly exists due to re-introduction of <a href="https://access.redhat.com/security/cve/CVE-2006-4334">CVE-2006-4334</a> issue: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334</a> in upstream gzip version (originally fixed in gzip-v1.3.6, reintroduced later in gzip-v1.3.10 and fixed again with above commit -- in gzip-v.1.3.13). Credit: ------- Oulu University Secure Programming Group (OUSPG)
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU gzip | =1.3.1 | |
GNU gzip | =1.3.8 | |
GNU gzip | <=1.3.12 | |
GNU gzip | =1.3 | |
GNU gzip | =1.3.3 | |
GNU gzip | =1.3.11 | |
GNU gzip | =1.3.6 | |
GNU gzip | =1.3.2 | |
GNU gzip | =1.2.4 | |
GNU gzip | =1.3.10 | |
GNU gzip | =1.3.5 | |
GNU gzip | =1.3.7 | |
GNU gzip | =1.2.4a | |
GNU gzip | =1.3.9 | |
GNU gzip | =1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.