First published: Mon Jan 11 2010(Updated: )
An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel–Ziv–Welch (LZW) compression algorithm. A remote attacker could provide a specially-crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip. Upstream patch: --------------- <a href="http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f">http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f</a> Acknowledgements: Red Hat would like to thank Aki Helin of the Oulu University Secure Programming Group for responsibly reporting this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
gzip |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-554418 is classified as a moderate vulnerability due to potential remote code execution risks.
To fix REDHAT-BUG-554418, update the GNU gzip package to the latest version available from your distribution's package manager.
REDHAT-BUG-554418 is caused by an integer underflow in gzip during the decompression of specially-crafted LZW compressed files.
Users of GNU gzip who decompress LZW compressed gzip archives are affected by REDHAT-BUG-554418.
Yes, REDHAT-BUG-554418 is exploitable if a user decompresses a maliciously crafted LZW compressed gzip file.