10 results (0.033 seconds)

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

12 Apr 2022 — An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep... • https://access.redhat.com/security/cve/CVE-2022-1271 • CWE-20: Improper Input Validation CWE-179: Incorrect Behavior Order: Early Validation CWE-1173: Improper Use of Validation Framework •

CVSS: 6.8EPSS: 6%CPEs: 15EXPL: 0

29 Jan 2010 — The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression. La función huft_build en inflate.c en gzip anterior a v1.3.13 crea una tabla hufts (también conocido como huffman) demasiado pequeña, lo que permite a atacantes remotos provocar una dene... • http://article.gmane.org/gmane.comp.gnu.gzip.bugs/258 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 12%CPEs: 16EXPL: 0

29 Jan 2010 — Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error. Desbordamiento de entero en la función unlzw en unlzw.c en gzip anterior a v1.4 sobre las plataformas de 64 bits, permiten a atacantes remotos provocar una denegación de servicio (caída de ... • http://git.savannah.gnu.org/cgit/gzip.git/commit/?id=a3db5806d012082b9e25cc36d09f19cd736a468f • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

13 May 2005 — zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

22 Apr 2005 — Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt •

CVSS: 6.3EPSS: 0%CPEs: 104EXPL: 0

06 Apr 2005 — Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

04 Oct 2004 — gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files. • http://secunia.com/advisories/12744 • CWE-269: Improper Privilege Management •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

30 Jun 2004 — gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332. gzexe en gzip 1.3.3 y anteriores ejecutaran un argumento cuando la creación de un fichero temporal falla, en lugar de terminar el programa, lo que podría permitir a atacantes remotos o usuarios locales ejecutar órdenes de su elección, una vulnerabilidad dif... • http://bugs.gentoo.org/show_bug.cgi?id=54890 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

10 Jun 2003 — znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files. znew en el paquete gzip permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en ficheros temporales. • http://www.debian.org/security/2003/dsa-308 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

18 Nov 2001 — Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc •