Gzip zgrep Implementation May Let Remote Users Execute Arbitrary Commands
|
|
SecurityTracker Alert ID: 1013928 |
|
SecurityTracker URL: http://securitytracker.com/id/1013928
|
|
CVE Reference:
CVE-2005-0758
(Links to External Site)
|
Date: May 10 2005
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.2.4
|
Description:
A vulnerability was reported in gzip in the zgrep implementation. A remote user may be able to cause arbitrary commands to be executed.
The zgrep code does not properly validate user-supplied arguments. If arguments originate from an untrusted source, then a user may be able to cause arbitrary commands to be executed on the target system.
The flaw resides in 'zgrep.in'.
|
Impact:
A remote user may be able to cause arbitrary commands to be executed.
|
Solution:
A patch for 'zgrep.in' is available in the following bug report:
http://bugs.gentoo.org/show_bug.cgi?id=90626
|
Vendor URL: www.gzip.org/ (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|