search menu icon-carat-right cmu-wordmark

CERT Coordination Center

gzip contains an infinite loop vulnerability in its LZH handling

Vulnerability Note VU#596848

Original Release Date: 2006-09-19 | Last Revised: 2011-07-22

Overview

The gzip program contains a infinite loop vulnerability that may allow an attacker to create a denial-of-service condition.

Description

The gzip program is used to compress and decompress archived files.

A infinite loop vulnerability exists in the way gzip handles certain files. An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted gzip file.

Note that the attacker could either convince a user to open a malicious gzip file, or save the file in a place where another program would call gzip to decompress the archive.

Impact

A remote, unauthenticated attacker may be able to create a denial-of-service condition.

Solution

Upgrade
This issue has been addressed in gzip 1.3.6. See the systems affected section of this document for information about specific vendors.

Workarounds
Until updates can be applied, the following workarounds may mitigate the impact of this vulnerability:

    • Do not decompress gzip files that are received from unknown sources.
    • Do not execute gzip with system-level privileges.
    • Some automated processes may rely on gzip to complete their tasks. When possible, disable such programs or do not allow them to execute gzip with root privileges.

Vendor Information

596848
 

View all 97 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Tavis Ormandy, Google Security Team for reporting this issue.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-4338
Severity Metric: 0.31
Date Public: 2006-06-19
Date First Published: 2006-09-19
Date Last Updated: 2011-07-22 12:45 UTC
Document Revision: 39

Sponsored by CISA.