First published: Mon Jan 11 2010(Updated: )
An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel–Ziv–Welch (LZW) compression algorithm. A remote attacker could provide a specially-crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip. Upstream patch: --------------- <a href="http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f">http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f</a> Acknowledgements: Red Hat would like to thank Aki Helin of the Oulu University Secure Programming Group for responsibly reporting this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU gzip | <=1.3.13 | |
GNU gzip | =1.2.4 | |
GNU gzip | =1.2.4a | |
GNU gzip | =1.3 | |
GNU gzip | =1.3.1 | |
GNU gzip | =1.3.2 | |
GNU gzip | =1.3.3 | |
GNU gzip | =1.3.4 | |
GNU gzip | =1.3.5 | |
GNU gzip | =1.3.6 | |
GNU gzip | =1.3.7 | |
GNU gzip | =1.3.8 | |
GNU gzip | =1.3.9 | |
GNU gzip | =1.3.10 | |
GNU gzip | =1.3.11 | |
GNU gzip | =1.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.