CPANSA-Compress-Raw-Zlib-2009-1391: Compress-Raw-Zlib vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2009-06-16T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2009-06-16T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
Vulnerabilities
CVE-2009-1391
Vulnerability DescriptionOff-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
Weakness | CWE-189 : Numeric Errors |
---|
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
Compress-Raw-Zlib less than 2.017 |
|
Fixed
- Compress-Raw-Zlib greater than or equal 2.017
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Compress-Raw-Zlib-2009-1391 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2009/cpansa-compress-raw-zlib-2009-1391.json - http://article.gmane.org/gmane.mail.virus.amavis.user/33635 external
http://article.gmane.org/gmane.mail.virus.amavis.user/33635 - http://article.gmane.org/gmane.mail.virus.amavis.user/33638 external
http://article.gmane.org/gmane.mail.virus.amavis.user/33638 - http://www.securityfocus.com/bid/35307 external
http://www.securityfocus.com/bid/35307 - http://secunia.com/advisories/35422 external
http://secunia.com/advisories/35422 - https://bugzilla.redhat.com/show_bug.cgi?id=504386 external
https://bugzilla.redhat.com/show_bug.cgi?id=504386 - http://www.vupen.com/english/advisories/2009/1571 external
http://www.vupen.com/english/advisories/2009/1571 - http://thread.gmane.org/gmane.mail.virus.amavis.user/33635 external
http://thread.gmane.org/gmane.mail.virus.amavis.user/33635 - http://osvdb.org/55041 external
http://osvdb.org/55041 - http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html external
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - http://secunia.com/advisories/35876 external
http://secunia.com/advisories/35876 - http://secunia.com/advisories/35685 external
http://secunia.com/advisories/35685 - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html external
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html - http://secunia.com/advisories/35689 external
http://secunia.com/advisories/35689 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:157 external
http://www.mandriva.com/security/advisories?name=MDVSA-2009:157 - http://security.gentoo.org/glsa/glsa-200908-07.xml external
http://security.gentoo.org/glsa/glsa-200908-07.xml - https://bugs.gentoo.org/show_bug.cgi?id=273141 external
https://bugs.gentoo.org/show_bug.cgi?id=273141 - https://exchange.xforce.ibmcloud.com/vulnerabilities/51062 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/51062 - https://usn.ubuntu.com/794-1/ external
https://usn.ubuntu.com/794-1/ - CVE-2009-1391 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2009-1391
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Tue Jun 16 00:00:00 2009 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/