Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-4335

Опубликовано: 02 дек. 2006
Источник: redhat
EPSS Низкий

Описание

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."

Отчет

Red Hat no longer plans to fix this issue in lha for Red Hat Enterprise Linux 4.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4lhaWill not fix
Red Hat Enterprise Linux 3gzipFixedRHSA-2006:066719.09.2006
Red Hat Enterprise Linux 4gzipFixedRHSA-2006:066719.09.2006

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 83%
0.02039
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."

nvd
почти 19 лет назад

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."

debian
почти 19 лет назад

Array index error in the make_table function in unlzh.c in the LZH dec ...

github
больше 3 лет назад

Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."

EPSS

Процентиль: 83%
0.02039
Низкий