5
CVSSv2

CVE-2006-4334

Published: 19/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Unspecified vulnerability in gzip 1.3.5 allows context-dependent malicious users to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

gzip gzip 1.3.5

Vendor Advisories

Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user’s privileges ...
Several vulnerabilities have been found in gzip, the GNU compression utilities The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2624 Thiemo Nagel discovered a missing input sanitation flaw in the way gzip used to decompress data blocks for dynamic Huffman codes, which could lead to the execution of arbi ...
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner CVE-2006-4335 Missing bou ...

References

NVD-CWE-Otherhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676http://www.redhat.com/support/errata/RHSA-2006-0667.htmlhttp://www.ubuntu.com/usn/usn-349-1http://www.us.debian.org/security/2006/dsa-1181http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852http://secunia.com/advisories/22002http://secunia.com/advisories/22009http://secunia.com/advisories/22017http://secunia.com/advisories/22033http://secunia.com/advisories/22034http://www.kb.cert.org/vuls/id/933712http://secunia.com/advisories/22012http://secunia.com/advisories/22043http://security.gentoo.org/glsa/glsa-200609-13.xmlhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.020-gzip.htmlhttp://www.novell.com/linux/security/advisories/2006_56_gzip.htmlhttp://secunia.com/advisories/22085http://secunia.com/advisories/22101http://www.trustix.org/errata/2006/0052/http://secunia.com/advisories/22027http://securitytracker.com/id?1016883http://support.avaya.com/elmodocs2/security/ASA-2006-218.htmhttp://secunia.com/advisories/22435ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.aschttp://www.securityfocus.com/bid/20101http://secunia.com/advisories/22661http://secunia.com/advisories/22487http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23155http://secunia.com/advisories/21996http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1http://secunia.com/advisories/23679https://issues.rpath.com/browse/RPL-615http://secunia.com/advisories/24435http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.htmlhttp://secunia.com/advisories/24636http://www.mandriva.com/security/advisories?name=MDKSA-2006:167http://www.vupen.com/english/advisories/2006/4275http://www.vupen.com/english/advisories/2007/0092http://www.vupen.com/english/advisories/2006/4750http://www.vupen.com/english/advisories/2007/0832http://www.vupen.com/english/advisories/2007/1171http://docs.info.apple.com/article.html?artnum=304829https://exchange.xforce.ibmcloud.com/vulnerabilities/29038https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10527http://www.securityfocus.com/archive/1/464268/100/0/threadedhttp://www.securityfocus.com/archive/1/462007/100/0/threadedhttp://www.securityfocus.com/archive/1/451324/100/0/threadedhttp://www.securityfocus.com/archive/1/450078/100/0/threadedhttp://www.securityfocus.com/archive/1/446426/100/0/threadedhttps://usn.ubuntu.com/349-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/933712