Debian Security Advisory
DSA-1181-1 gzip -- several vulnerabilities
- Date Reported:
- 19 Sep 2006
- Affected Packages:
- gzip
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338.
- More information:
-
Tavis Ormandy from the Google Security Team discovered several vulnerabilities in gzip, the GNU compression utility. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2006-4334
A null pointer dereference may lead to denial of service if gzip is used in an automated manner.
- CVE-2006-4335
Missing boundary checks may lead to stack modification, allowing execution of arbitrary code.
- CVE-2006-4336
A buffer underflow in the pack support code may lead to execution of arbitrary code.
- CVE-2006-4337
A buffer underflow in the LZH support code may lead to execution of arbitrary code.
- CVE-2006-4338
An infinite loop may lead to denial of service if gzip is used in an automated manner.
For the stable distribution (sarge) these problems have been fixed in version 1.3.5-10sarge2.
For the unstable distribution (sid) these problems have been fixed in version 1.3.5-15.
We recommend that you upgrade your gzip package.
- CVE-2006-4334
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.dsc
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/g/gzip/gzip_1.3.5-10sarge2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.