CVE-2010-0001
⚪ Do wiadomości
Niedostateczne sprawdzenie wartości w gzip pozwala na zdalne wywołanie błędu i awarię aplikacji.
CVSS
6.8
EPSS
22.6%
Exploit
none
Vendor
gnu
Opis źródłowy (NVD)
Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 22.6% |
| Opublikowano (NVD) | 2010-01-29 18:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 01:13:23 UTC |
Referencje
- http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f (secalert@redhat.com)
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083 (secalert@redhat.com)
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 (secalert@redhat.com)
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html (secalert@redhat.com)
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html (secalert@redhat.com)
- http://ncompress.sourceforge.net/#status (secalert@redhat.com)
- http://savannah.gnu.org/forum/forum.php?forum_id=6153 (secalert@redhat.com)
- http://secunia.com/advisories/38220 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/38223 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/38225 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/38232 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/40551 (secalert@redhat.com)
- http://secunia.com/advisories/40655 (secalert@redhat.com)
- http://secunia.com/advisories/40689 (secalert@redhat.com)
- http://securitytracker.com/id?1023490 (secalert@redhat.com)
- http://support.apple.com/kb/HT4435 (secalert@redhat.com)
- http://www.debian.org/security/2010/dsa-1974 (secalert@redhat.com)
- http://www.debian.org/security/2010/dsa-2074 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:019 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:020 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:152 (secalert@redhat.com)
- http://www.osvdb.org/61869 (secalert@redhat.com)
- http://www.redhat.com/support/errata/RHSA-2010-0061.html (secalert@redhat.com)
- http://www.ubuntu.com/usn/USN-889-1 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2010/0185 (secalert@redhat.com) [Vendor Advisory]
- http://www.vupen.com/english/advisories/2010/1796 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2010/1872 (secalert@redhat.com)
- https://bugzilla.redhat.com/show_bug.cgi?id=554418 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10546 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7511 (secalert@redhat.com)
- https://rhn.redhat.com/errata/RHSA-2010-0095.html (secalert@redhat.com)