[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2010:020 -- Mandriva gzip

ID: oval:org.secpod.oval:def:300108Date: (C)2012-01-07   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in gzip: A missing input sanitation flaw was found in the way gzip used to decompress data blocks for dynamic Huffman codes. A remote attacker could provide a specially-crafted gzip compressed data archive, which once opened by a local, unsuspecting user would lead to denial of service or, potentially, to arbitrary code execution with the privileges of the user running gzip . An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel-Ziv-Welch compression algorithm. A remote attacker could provide a specially-crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip . Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2010.0
Mandriva Linux 2009.0
Mandriva Linux 2009.1
Mandriva Linux 2008.0
Product:
gzip
Reference:
MDVSA-2010:020
CVE-2010-0001
CVE-2009-2624
CVE    2
CVE-2009-2624
CVE-2010-0001
CPE    4
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2009.1
cpe:/o:mandriva:linux:2010.0
...

© SecPod Technologies