TUCoPS :: Unix :: General :: unix5056.htm

gzip buffer overflow may lead in root compromise
1st Feb 2002 [SBWID-5056]
COMMAND

	gzip buffer overflow may lead in root compromise

SYSTEMS AFFECTED

	gzip 1.2.4

PROBLEM

	In            MadrakeSoft            advisory             MDKSA-2002:011
	[http://www.mandrakesecure.net/en/advisories/] :
	

	There are two problems with the gzip archiving program; the first  is  a
	crash when an input file name is over 1020 characters,  and  the  second
	is a buffer overflow that could be exploited if gzip is run on a  server
	such as an FTP server. The patch applied is  from  the  gzip  developers
	and the problems have been fixed in the latest beta.

SOLUTION

	Get patch from :
	

	http://www.gzip.org/#patch

	

	Diff below :
	

	--- gzip-1.2.4/gzip.c	Thu Aug 19 15:39:43 1993

	+++ gzip-1.2.4b/gzip.c	Tue Jan  8 21:44:18 2002

	@@ -1005,7 +1005,14 @@

	 #ifdef NO_MULTIPLE_DOTS

	     char *dot; /* pointer to ifname extension, or NULL */

	 #endif

	+    int max_suffix_len = (z_len > 3 ? z_len : 3);

	 

	+    /* Leave enough room in ifname or ofname for suffix: */

	+    if (strlen(iname) >= sizeof(ifname) - max_suffix_len) {

	+        strncpy(ifname, iname, sizeof(ifname) - 1);

	+	/* last byte of ifname is already zero and never overwritten */

	+        error(\"file name too long\");

	+    }

	     strcpy(ifname, iname);

	 

	     /* If input file exists, return OK. */

	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH