Mandriva Linux Security Advisory : gzip (MDVSA-2010:020)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Multiple vulnerabilities has been found and corrected in gzip :

A missing input sanitation flaw was found in the way gzip used to
decompress data blocks for dynamic Huffman codes. A remote attacker
could provide a specially crafted gzip compressed data archive, which
once opened by a local, unsuspecting user would lead to denial of
service (gzip crash) or, potentially, to arbitrary code execution with
the privileges of the user running gzip (CVE-2009-2624).

An integer underflow leading to array index error was found in the way
gzip used to decompress files / archives, compressed with the
Lempel-Ziv-Welch (LZW) compression algorithm. A remote attacker could
provide a specially crafted LZW compressed gzip archive, which once
decompressed by a local, unsuspecting user would lead to gzip crash,
or, potentially to arbitrary code execution with the privileges of the
user running gzip (CVE-2010-0001).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct these issues.

Solution :

Update the affected gzip package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 44101 (mandriva_MDVSA-2010-020.nasl)

Bugtraq ID:

CVE ID: CVE-2009-2624
CVE-2010-0001

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now