7.5
CVSSv2

CVE-2006-4336

Published: 19/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent malicious users to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.

Vulnerable Product Search on Vulmon Subscribe to Product

gzip gzip 1.3.5

Vendor Advisories

Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user’s privileges ...
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner CVE-2006-4335 Missing bou ...

References

NVD-CWE-Otherhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676http://www.redhat.com/support/errata/RHSA-2006-0667.htmlhttp://www.ubuntu.com/usn/usn-349-1http://www.us.debian.org/security/2006/dsa-1181http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852http://secunia.com/advisories/22002http://secunia.com/advisories/22009http://secunia.com/advisories/22017http://secunia.com/advisories/22033http://secunia.com/advisories/22034http://www.kb.cert.org/vuls/id/554780http://secunia.com/advisories/22012http://secunia.com/advisories/22043http://security.gentoo.org/glsa/glsa-200609-13.xmlhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.020-gzip.htmlhttp://www.novell.com/linux/security/advisories/2006_56_gzip.htmlhttp://secunia.com/advisories/22085http://secunia.com/advisories/22101http://www.trustix.org/errata/2006/0052/http://secunia.com/advisories/22027http://securitytracker.com/id?1016883http://support.avaya.com/elmodocs2/security/ASA-2006-218.htmhttp://secunia.com/advisories/22435ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.aschttp://www.securityfocus.com/bid/20101http://secunia.com/advisories/22661http://secunia.com/advisories/22487http://docs.info.apple.com/article.html?artnum=304829http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200611-24.xmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23153http://secunia.com/advisories/23155http://secunia.com/advisories/23156http://secunia.com/advisories/21996http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1http://secunia.com/advisories/23679https://issues.rpath.com/browse/RPL-615http://secunia.com/advisories/24435http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.htmlhttp://secunia.com/advisories/24636http://www.mandriva.com/security/advisories?name=MDKSA-2006:167http://www.vupen.com/english/advisories/2006/3695http://www.vupen.com/english/advisories/2006/4760http://www.vupen.com/english/advisories/2006/4275http://www.vupen.com/english/advisories/2007/0092http://www.vupen.com/english/advisories/2006/4750http://www.vupen.com/english/advisories/2007/0832http://www.vupen.com/english/advisories/2007/1171https://exchange.xforce.ibmcloud.com/vulnerabilities/29042https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10140http://www.securityfocus.com/archive/1/464268/100/0/threadedhttp://www.securityfocus.com/archive/1/462007/100/0/threadedhttp://www.securityfocus.com/archive/1/451324/100/0/threadedhttp://www.securityfocus.com/archive/1/450078/100/0/threadedhttp://www.securityfocus.com/archive/1/446426/100/0/threadedhttps://usn.ubuntu.com/349-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/554780