Page 2 of 16 results (0.004 seconds)

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability." Error de índice de array en la función make_table en unlzh.c en el componente de descompresión LZH en gzip 1.3.5, cuando se ejecuta en ciertas plataformas, permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección vía un archivo GZIP artesanal que dispara una escritura fuera de rango, también conocida como "vulnerabilidad de modificación de pila". • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/21996 http://secunia.com/advisories/22002 http://secunia.com/advisories/22009 http://secunia.com/advisories/22012 http://secunia.com/advisories/22017 http://secunia.com/advisories/22027 http:&#x •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index. Desbordamiento de búfer en la función build_tree en gzip 1.3.5 permite a atacantes dependientes de contexto ejecutar código de su elección vía una tabla de contadores de hoja artesanal que provoca una escritura en un índice negativo. • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/21996 http://secunia.com/advisories/22002 http://secunia.com/advisories/22009 http://secunia.com/advisories/22012 http://secunia.com/advisories/22017 http://secunia.com/advisories/22027 http:&#x •

CVSS: 5.0EPSS: 8%CPEs: 1EXPL: 0

Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference. Vulnerabilidad no especificada en gzip 1.3.5 permite a atacantes dependientes de contexto causar una denegación de servicio (caída) vía un archivo GZIP (gz) artesanal, lo cual resulta en una referencia a NULL. • ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 http://docs.info.apple.com/article.html?artnum=304829 http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html http://secunia.com/advisories/21996 http://secunia.com/advisories/22002 http://secunia.com/advisories/22009 http://secunia.com/advisories/22012 http://secunia.com/advisories/22017 http://secunia.com/advisories/22027 http:&#x •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc http://bugs.gentoo.org/show_bug.cgi?id=90626 http://docs.info.apple.com/article.html?artnum=306172 http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html http://rhn.redhat.com/errata/RHSA-2005-357.html http://secunia.com/advisories/18100 http://secunia.com/advisories/19183 http://secunia.com/advisories/2 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255 http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http://marc.info/?l=bugtraq&m=111402732406477&w=2 http://rhn.redhat.com/errata/RHSA-2005-357.html http://secunia.com/advisories/15047 http://secunia.com/advisories/18100 http://secunia.com/advisories/21253 http://secunia.com/advisories/22033 http://slackware.com/ •