7.5
CVSSv2

CVE-2006-4335

Published: 19/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

gzip gzip 1.3.5

Vendor Advisories

Debian Bug report logs - #401301 lha: LHa Multiple Vulnerabilities Package: lha; Maintainer for lha is (unknown); Reported by: Stefan Fritsch <sf@sfritschde> Date: Sat, 2 Dec 2006 13:03:11 UTC Severity: grave Tags: security Found in version lha/114i-10 Fixed in version 114i-101 Done: Moritz Muehlenhoff <jmm@inuti ...
Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user’s privileges ...
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner CVE-2006-4335 Missing bou ...

References

NVD-CWE-Otherhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676http://www.redhat.com/support/errata/RHSA-2006-0667.htmlhttp://www.ubuntu.com/usn/usn-349-1http://www.us.debian.org/security/2006/dsa-1181http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852http://secunia.com/advisories/22002http://secunia.com/advisories/22009http://secunia.com/advisories/22017http://secunia.com/advisories/22033http://secunia.com/advisories/22034http://www.kb.cert.org/vuls/id/381508http://secunia.com/advisories/22012http://secunia.com/advisories/22043http://security.gentoo.org/glsa/glsa-200609-13.xmlhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.020-gzip.htmlhttp://www.novell.com/linux/security/advisories/2006_56_gzip.htmlhttp://secunia.com/advisories/22085http://secunia.com/advisories/22101http://www.trustix.org/errata/2006/0052/http://secunia.com/advisories/22027http://securitytracker.com/id?1016883http://support.avaya.com/elmodocs2/security/ASA-2006-218.htmhttp://secunia.com/advisories/22435ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.aschttp://www.securityfocus.com/bid/20101http://secunia.com/advisories/22661http://secunia.com/advisories/22487http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200611-24.xmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23153http://secunia.com/advisories/23155http://secunia.com/advisories/23156http://secunia.com/advisories/21996http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1http://secunia.com/advisories/23679https://issues.rpath.com/browse/RPL-615http://secunia.com/advisories/24435http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.htmlhttp://secunia.com/advisories/24636http://www.mandriva.com/security/advisories?name=MDKSA-2006:167http://www.vupen.com/english/advisories/2006/3695http://www.vupen.com/english/advisories/2006/4760http://www.vupen.com/english/advisories/2006/4275http://www.vupen.com/english/advisories/2007/0092http://www.vupen.com/english/advisories/2006/4750http://www.vupen.com/english/advisories/2007/0832http://www.vupen.com/english/advisories/2007/1171http://docs.info.apple.com/article.html?artnum=304829https://exchange.xforce.ibmcloud.com/vulnerabilities/29040https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10391http://www.securityfocus.com/archive/1/464268/100/0/threadedhttp://www.securityfocus.com/archive/1/462007/100/0/threadedhttp://www.securityfocus.com/archive/1/451324/100/0/threadedhttp://www.securityfocus.com/archive/1/450078/100/0/threadedhttp://www.securityfocus.com/archive/1/446426/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=401301https://usn.ubuntu.com/349-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/381508