7.5
CVSSv2

CVE-2006-4337

Published: 19/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent malicious users to execute arbitrary code via a crafted decoding table in a GZIP archive.

Vulnerable Product Search on Vulmon Subscribe to Product

gzip gzip 1.3.5

Vendor Advisories

Debian Bug report logs - #401301 lha: LHa Multiple Vulnerabilities Package: lha; Maintainer for lha is (unknown); Reported by: Stefan Fritsch <sf@sfritschde> Date: Sat, 2 Dec 2006 13:03:11 UTC Severity: grave Tags: security Found in version lha/114i-10 Fixed in version 114i-101 Done: Moritz Muehlenhoff <jmm@inuti ...
Tavis Ormandy discovered that gzip did not sufficiently verify the validity of gzip or compress archives while unpacking By tricking an user or automated system into unpacking a specially crafted compressed file, this could be exploited to execute arbitrary code with the user’s privileges ...
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-4334 A null pointer dereference may lead to denial of service if gzip is used in an automated manner CVE-2006-4335 Missing bou ...

References

NVD-CWE-Otherhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676http://www.redhat.com/support/errata/RHSA-2006-0667.htmlhttp://www.ubuntu.com/usn/usn-349-1http://www.us.debian.org/security/2006/dsa-1181http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.aschttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852http://secunia.com/advisories/22002http://secunia.com/advisories/22009http://secunia.com/advisories/22017http://secunia.com/advisories/22033http://secunia.com/advisories/22034http://secunia.com/advisories/22012http://secunia.com/advisories/22043http://security.gentoo.org/glsa/glsa-200609-13.xmlhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.020-gzip.htmlhttp://www.novell.com/linux/security/advisories/2006_56_gzip.htmlhttp://secunia.com/advisories/22085http://secunia.com/advisories/22101http://www.trustix.org/errata/2006/0052/http://secunia.com/advisories/22027http://securitytracker.com/id?1016883http://support.avaya.com/elmodocs2/security/ASA-2006-218.htmhttp://secunia.com/advisories/22435ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.aschttp://www.securityfocus.com/bid/20101http://secunia.com/advisories/22661http://secunia.com/advisories/22487http://docs.info.apple.com/article.html?artnum=304829http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200611-24.xmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23153http://secunia.com/advisories/23155http://secunia.com/advisories/23156http://secunia.com/advisories/21996http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1http://secunia.com/advisories/23679https://issues.rpath.com/browse/RPL-615http://secunia.com/advisories/24435http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.htmlhttp://secunia.com/advisories/24636http://www.mandriva.com/security/advisories?name=MDKSA-2006:167http://www.vupen.com/english/advisories/2006/3695http://www.vupen.com/english/advisories/2006/4760http://www.vupen.com/english/advisories/2006/4275http://www.vupen.com/english/advisories/2007/0092http://www.vupen.com/english/advisories/2006/4750http://www.vupen.com/english/advisories/2007/0832http://www.vupen.com/english/advisories/2007/1171https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11212http://www.securityfocus.com/archive/1/464268/100/0/threadedhttp://www.securityfocus.com/archive/1/462007/100/0/threadedhttp://www.securityfocus.com/archive/1/451324/100/0/threadedhttp://www.securityfocus.com/archive/1/450078/100/0/threadedhttp://www.securityfocus.com/archive/1/446426/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=401301https://usn.ubuntu.com/349-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/773548