CPANSA-Compress-Raw-Zlib-2009-1391: Compress-Raw-Zlib vulnerability
| Publisher | giterlizzi | Document category | csaf_security_advisory |
|---|---|---|---|
| Initial release date | 2009-06-16T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
| Current release date | 2009-06-16T00:00:00 | Build Date | |
| Current version | 1 | Status | final |
| CVSS v3.1 Base Score | Severity | ||
| Original language | Language | en | |
| Also referred to | |||
Vulnerability Description
Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
Vulnerabilities
CVE-2009-1391
Vulnerability DescriptionOff-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
| Weakness | CWE-189 : Numeric Errors |
|---|
Product status
Known affected
| Product | Score | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Compress-Raw-Zlib less than 2.017 |
|
Fixed
- Compress-Raw-Zlib greater than or equal 2.017
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Compress-Raw-Zlib-2009-1391 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2009/cpansa-compress-raw-zlib-2009-1391.json - http://article.gmane.org/gmane.mail.virus.amavis.user/33635 external
http://article.gmane.org/gmane.mail.virus.amavis.user/33635 - http://article.gmane.org/gmane.mail.virus.amavis.user/33638 external
http://article.gmane.org/gmane.mail.virus.amavis.user/33638 - http://www.securityfocus.com/bid/35307 external
http://www.securityfocus.com/bid/35307 - http://secunia.com/advisories/35422 external
http://secunia.com/advisories/35422 - https://bugzilla.redhat.com/show_bug.cgi?id=504386 external
https://bugzilla.redhat.com/show_bug.cgi?id=504386 - http://www.vupen.com/english/advisories/2009/1571 external
http://www.vupen.com/english/advisories/2009/1571 - http://thread.gmane.org/gmane.mail.virus.amavis.user/33635 external
http://thread.gmane.org/gmane.mail.virus.amavis.user/33635 - http://osvdb.org/55041 external
http://osvdb.org/55041 - http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html external
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - http://secunia.com/advisories/35876 external
http://secunia.com/advisories/35876 - http://secunia.com/advisories/35685 external
http://secunia.com/advisories/35685 - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html external
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html - http://secunia.com/advisories/35689 external
http://secunia.com/advisories/35689 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:157 external
http://www.mandriva.com/security/advisories?name=MDVSA-2009:157 - http://security.gentoo.org/glsa/glsa-200908-07.xml external
http://security.gentoo.org/glsa/glsa-200908-07.xml - https://bugs.gentoo.org/show_bug.cgi?id=273141 external
https://bugs.gentoo.org/show_bug.cgi?id=273141 - https://exchange.xforce.ibmcloud.com/vulnerabilities/51062 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/51062 - https://usn.ubuntu.com/794-1/ external
https://usn.ubuntu.com/794-1/ - CVE-2009-1391 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2009-1391
Revision history
| Version | Date of the revision | Summary of the revision |
|---|---|---|
| 1 | Tue Jun 16 00:00:00 2009 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/