CVE-2001-1228

Current Description

Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server.

Basic Data

PublishedNovember 18, 2001
Last ModifiedSeptember 10, 2008
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGzip1.2.4*******
    2.3ApplicationGnuGzip1.2.4a*******
    2.3ApplicationGnuGzip1.3*******

Vulnerable Software List

VendorProductVersions
Gnu Gzip 1.2.4, 1.2.4a, 1.3

References

NameSourceURLTags
NetBSD-SA2002-002ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.ascNETBSD
20011230 gzip bug w/ patch..http://online.securityfocus.com/archive/1/247717BUGTRAQPatch Vendor Advisory
gzip-long-filename-bo(7882)http://www.iss.net/security_center/static/7882.phpXF
3712http://www.securityfocus.com/bid/3712BID