fkie_cve-2010-0001
Vulnerability from fkie_nvd
Published
2010-01-29 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
References
secalert@redhat.comhttp://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
secalert@redhat.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
secalert@redhat.comhttp://ncompress.sourceforge.net/#status
secalert@redhat.comhttp://savannah.gnu.org/forum/forum.php?forum_id=6153
secalert@redhat.comhttp://secunia.com/advisories/38220Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38223Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38225Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/38232Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/40551
secalert@redhat.comhttp://secunia.com/advisories/40655
secalert@redhat.comhttp://secunia.com/advisories/40689
secalert@redhat.comhttp://securitytracker.com/id?1023490
secalert@redhat.comhttp://support.apple.com/kb/HT4435
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-1974
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-2074
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:019
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:020
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:152
secalert@redhat.comhttp://www.osvdb.org/61869
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0061.html
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-889-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/0185Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1796
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1872
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=554418
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511
secalert@redhat.comhttps://rhn.redhat.com/errata/RHSA-2010-0095.html
af854a3a-2127-422b-91ae-364da2661108http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://ncompress.sourceforge.net/#status
af854a3a-2127-422b-91ae-364da2661108http://savannah.gnu.org/forum/forum.php?forum_id=6153
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38220Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38223Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38225Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38232Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40551
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40655
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40689
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023490
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1974
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-2074
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:019
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:020
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:152
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/61869
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0061.html
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-889-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0185Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1796
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1872
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=554418
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0095.html
Impacted products
Vendor Product Version
gnu gzip *
gnu gzip 1.2.4
gnu gzip 1.2.4a
gnu gzip 1.3
gnu gzip 1.3.1
gnu gzip 1.3.2
gnu gzip 1.3.3
gnu gzip 1.3.4
gnu gzip 1.3.5
gnu gzip 1.3.6
gnu gzip 1.3.7
gnu gzip 1.3.8
gnu gzip 1.3.9
gnu gzip 1.3.10
gnu gzip 1.3.11
gnu gzip 1.3.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED29704-4CF0-4870-A76B-6109335BB9F9",
              "versionEndIncluding": "1.3.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCFD9CEE-AAB0-443E-A5C7-6805AFCCF6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7830E23E-C3B2-40D1-A82B-8862F82AA996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F71B1D-B822-4C4F-9009-8D8E1B9707FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1B19DCC-2441-453F-8CFE-93A2FD37446C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92ACD5A-D7D3-4DBA-A7AA-BBCA2E20BA50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "614F29C6-AEB8-4274-B0F4-865DF32CCBAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "52D3F910-090A-43AA-8639-443DFF230958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A28E3EC1-6788-459A-A4F9-0969C007131C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8563855-787C-488E-B241-1F32AD783E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD2768C-CD7E-4B2E-8919-8319D84A71DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E56B3BD-EDB2-4BE1-821F-2F84548FBF9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:gzip:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "90855FEC-4F23-46CF-AE91-C77D6171B4D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n unlzw  en unlzw.c en gzip anterior a v1.4 sobre las plataformas de 64 bits, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo manipulado que emplea la compresi\u00f3n LZW, permitiendo a un array indexar el error."
    }
  ],
  "id": "CVE-2010-0001",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-01-29T18:30:00.947",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ncompress.sourceforge.net/#status"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38220"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38225"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40551"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40655"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/40689"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1023490"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2010/dsa-2074"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/61869"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1796"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1872"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ncompress.sourceforge.net/#status"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40655"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/40689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023490"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-1974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-2074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/61869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0061.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-889-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1796"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…