DSA-1181-1 gzip -- several vulnerabilities

Related Vulnerabilities: CVE-2006-4334   CVE-2006-4335   CVE-2006-4336   CVE-2006-4337   CVE-2006-4338  

Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner. CVE-2006-4335 Missing boundary checks may lead to stack modification, allowing execution of arbitrary code. CVE-2006-4336 A buffer underflow in the pack support code may lead to execution of arbitrary code. CVE-2006-4337 A buffer underflow in the LZH support code may lead to execution of arbitrary code. CVE-2006-4338 An infinite loop may lead to denial of service if gzip is used in an automated manner. For the stable distribution (sarge) these problems have been fixed in version 1.3.5-10sarge2. For the unstable distribution (sid) these problems have been fixed in version 1.3.5-15. We recommend that you upgrade your gzip package.

Debian Security Advisory

DSA-1181-1 gzip -- several vulnerabilities

Date Reported:
19 Sep 2006
Affected Packages:
gzip
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338.
More information:

Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2006-4334

    A null pointer dereference may lead to denial of service if gzip is used in an automated manner.

  • CVE-2006-4335

    Missing boundary checks may lead to stack modification, allowing execution of arbitrary code.

  • CVE-2006-4336

    A buffer underflow in the pack support code may lead to execution of arbitrary code.

  • CVE-2006-4337

    A buffer underflow in the LZH support code may lead to execution of arbitrary code.

  • CVE-2006-4338

    An infinite loop may lead to denial of service if gzip is used in an automated manner.

For the stable distribution (sarge) these problems have been fixed in version 1.3.5-10sarge2.

For the unstable distribution (sid) these problems have been fixed in version 1.3.5-15.

We recommend that you upgrade your gzip package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.