First published: Mon Jan 11 2010(Updated: )
An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel–Ziv–Welch (LZW) compression algorithm. A remote attacker could provide a specially-crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip. Upstream patch: --------------- <a href="http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f">http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f</a> Acknowledgements: Red Hat would like to thank Aki Helin of the Oulu University Secure Programming Group for responsibly reporting this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
gzip | <=1.3.13 | |
gzip | =1.3.12 | |
gzip | =1.3.1 | |
gzip | =1.3.8 | |
gzip | =1.3 | |
gzip | =1.3.3 | |
gzip | =1.3.11 | |
gzip | =1.3.6 | |
gzip | =1.3.2 | |
gzip | =1.2.4 | |
gzip | =1.3.10 | |
gzip | =1.3.5 | |
gzip | =1.3.7 | |
gzip | =1.2.4a | |
gzip | =1.3.9 | |
gzip | =1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0001 is considered a medium severity vulnerability due to the potential for remote code execution.
To fix CVE-2010-0001, update gzip to version 1.3.14 or later, which addresses the integer underflow issue.
The affected versions of gzip include all versions prior to 1.3.14, specifically versions 1.2.4 through 1.3.13.
CVE-2010-0001 is an integer underflow vulnerability that leads to array index errors during file decompression.
Yes, CVE-2010-0001 can be exploited remotely if a user decompresses a specially-crafted LZW compressed gzip archive.