6.8
CVSSv2

CVE-2010-0001

Published: 29/01/2010 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 607
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer underflow in the unlzw function in unlzw.c in gzip prior to 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gzip

gnu gzip 1.3.12

gnu gzip 1.3.1

gnu gzip 1.3.8

gnu gzip 1.3

gnu gzip 1.3.3

gnu gzip 1.3.11

gnu gzip 1.3.6

gnu gzip 1.3.2

gnu gzip 1.2.4

gnu gzip 1.3.10

gnu gzip 1.3.5

gnu gzip 1.3.7

gnu gzip 1.2.4a

gnu gzip 1.3.9

gnu gzip 1.3.4

Vendor Advisories

Synopsis Moderate: gzip security update Type/Severity Security Advisory: Moderate Topic An updated gzip package that fixes one security issue is now available forRed Hat Enterprise Linux 3, 4, and 5This update has been rated as having moderate security impact by the RedHat Security Response Team ...
Debian Bug report logs - #566002 CVE-2010-0001: integer underflow Package: gzip; Maintainer for gzip is Bdale Garbee <bdale@gagcom>; Source for gzip is src:gzip (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 20 Jan 2010 14:57:01 UTC Severity: grave Tags: patch, security ...
It was discovered that gzip incorrectly handled certain malformed compressed files If a user or automated system were tricked into opening a specially crafted gzip file, an attacker could cause gzip to crash or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2009-2624) ...
Several vulnerabilities have been found in gzip, the GNU compression utilities The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2624 Thiemo Nagel discovered a missing input sanitation flaw in the way gzip used to decompress data blocks for dynamic Huffman codes, which could lead to the execution of arbi ...
Aki Helin discovered an integer underflow in ncompress, the original Lempel-Ziv compress/uncompress programs This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive For the stable distribution (lenny), this problem has been fixed in version 4242-1+lenny1 For the testing (squeeze) and ...

References

CWE-189http://securitytracker.com/id?1023490http://secunia.com/advisories/38225http://secunia.com/advisories/38232http://www.debian.org/security/2010/dsa-1974http://www.osvdb.org/61869http://secunia.com/advisories/38223http://secunia.com/advisories/38220http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468fhttp://www.vupen.com/english/advisories/2010/0185http://www.mandriva.com/security/advisories?name=MDVSA-2010:019https://bugzilla.redhat.com/show_bug.cgi?id=554418http://savannah.gnu.org/forum/forum.php?forum_id=6153http://www.ubuntu.com/usn/USN-889-1http://www.mandriva.com/security/advisories?name=MDVSA-2010:020http://www.redhat.com/support/errata/RHSA-2010-0061.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.htmlhttps://rhn.redhat.com/errata/RHSA-2010-0095.htmlhttp://www.vupen.com/english/advisories/2010/1796http://secunia.com/advisories/40551http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083http://www.vupen.com/english/advisories/2010/1872http://secunia.com/advisories/40689http://www.debian.org/security/2010/dsa-2074http://secunia.com/advisories/40655http://ncompress.sourceforge.net/#statushttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlhttp://support.apple.com/kb/HT4435http://www.mandriva.com/security/advisories?name=MDVSA-2011:152http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546https://access.redhat.com/errata/RHSA-2010:0061https://usn.ubuntu.com/889-1/https://nvd.nist.gov