CentOS 3 / 4 : gzip (CESA-2006:0667)

high Nessus Plugin ID 22422

Synopsis

The remote CentOS host is missing a security update.

Description

Updated gzip packages that fix several security issues are now available for Red Hat Enterprise Linux.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The gzip package contains the GNU gzip data compression program.

Tavis Ormandy of the Google Security Team discovered two denial of service flaws in the way gzip expanded archive files. If a victim expanded a specially crafted archive, it could cause the gzip executable to hang or crash. (CVE-2006-4334, CVE-2006-4338)

Tavis Ormandy of the Google Security Team discovered several code execution flaws in the way gzip expanded archive files. If a victim expanded a specially crafted archive, it could cause the gzip executable to crash or execute arbitrary code. (CVE-2006-4335, CVE-2006-4336, CVE-2006-4337)

Users of gzip should upgrade to these updated packages, which contain a backported patch and is not vulnerable to these issues.

Solution

Update the affected gzip package.

See Also

http://www.nessus.org/u?517e38ed

http://www.nessus.org/u?a4c7d464

http://www.nessus.org/u?29860d2a

http://www.nessus.org/u?049b9f6d

http://www.nessus.org/u?02804933

http://www.nessus.org/u?0ad76939

Plugin Details

Severity: High

ID: 22422

File Name: centos_RHSA-2006-0667.nasl

Version: 1.18

Type: local

Agent: unix

Published: 9/22/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:gzip, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/19/2006

Vulnerability Publication Date: 9/19/2006

Reference Information

CVE: CVE-2006-4334, CVE-2006-4335, CVE-2006-4336, CVE-2006-4337, CVE-2006-4338

RHSA: 2006:0667