search menu icon-carat-right cmu-wordmark

CERT Coordination Center

gzip contains a .bss buffer overflow in its LZH handling

Vulnerability Note VU#773548

Original Release Date: 2006-09-19 | Last Revised: 2011-07-22

Overview

The gzip program contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code or create a denial-of-service condition.

Description

The gzip program is used to compress and decompress archived files. Some implementations of gzip include support for the LZH compression algorithm.

A buffer overflow vulnerability exists in the way gzip handles certain files compressed with the LZH algorithm. An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted gzip file.

Note that the attacker could either 1) convince a user to open a malicious gzip file, or 2) save the file in a place where another program would call gzip to decompress the archive.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code or create a denial-of-service condition.

Solution

Upgrade or apply a patch from the vendor
This issue has been addressed in gzip 1.3.6. See the systems affected section of this document for information about specific vendors.

Workarounds
Until updates can be applied, the following workarounds may mitigate the impact of this vulnerability:

    • Do not decompress gzip files that are received from unknown sources.
    • Do not execute gzip with system-level privileges.
    • Some automated processes may rely on gzip to complete their tasks. When possible, disable such programs or do not allow them to execute gzip with root privileges.

Vendor Information

773548
 

View all 98 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Tavis Ormandy, Google Security Team for reporting this issue.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-4337
Severity Metric: 1.57
Date Public: 2006-06-19
Date First Published: 2006-09-19
Date Last Updated: 2011-07-22 12:43 UTC
Document Revision: 44

Sponsored by CISA.