Mandriva Linux Security Advisory : ncompress (MDVSA-2011:152)

medium Nessus Plugin ID 56530
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Mandriva Linux host is missing a security update.


A vulnerability has been found and corrected in ncompress :

An integer underflow leading to array index error was found in the way gzip used to decompress files / archives, compressed with the Lempel-Ziv-Welch (LZW) compression algorithm. A remote attacker could provide a specially crafted LZW compressed gzip archive, which once decompressed by a local, unsuspecting user would lead to gzip crash, or, potentially to arbitrary code execution with the privileges of the user running gzip (CVE-2010-0001).

The updated packages have been upgraded to the version which is not vulnerable to this issue.


Update the affected ncompress package.

Plugin Details

Severity: Medium

ID: 56530

File Name: mandriva_MDVSA-2011-152.nasl

Version: 1.9

Type: local

Published: 10/18/2011

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:o:mandriva:linux:2010.1:*:*:*:*:*:*:*, p-cpe:2.3:a:mandriva:linux:ncompress:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/17/2011

Reference Information

CVE: CVE-2010-0001

BID: 37886

CWE: 189

MDVSA: 2011:152