1st Feb 2002 [SBWID-5056]
COMMAND
gzip buffer overflow may lead in root compromise
SYSTEMS AFFECTED
gzip 1.2.4
PROBLEM
In MadrakeSoft advisory MDKSA-2002:011
[http://www.mandrakesecure.net/en/advisories/] :
There are two problems with the gzip archiving program; the first is a
crash when an input file name is over 1020 characters, and the second
is a buffer overflow that could be exploited if gzip is run on a server
such as an FTP server. The patch applied is from the gzip developers
and the problems have been fixed in the latest beta.
SOLUTION
Get patch from :
http://www.gzip.org/#patch
Diff below :
--- gzip-1.2.4/gzip.c Thu Aug 19 15:39:43 1993
+++ gzip-1.2.4b/gzip.c Tue Jan 8 21:44:18 2002
@@ -1005,7 +1005,14 @@
#ifdef NO_MULTIPLE_DOTS
char *dot; /* pointer to ifname extension, or NULL */
#endif
+ int max_suffix_len = (z_len > 3 ? z_len : 3);
+ /* Leave enough room in ifname or ofname for suffix: */
+ if (strlen(iname) >= sizeof(ifname) - max_suffix_len) {
+ strncpy(ifname, iname, sizeof(ifname) - 1);
+ /* last byte of ifname is already zero and never overwritten */
+ error(\"file name too long\");
+ }
strcpy(ifname, iname);
/* If input file exists, return OK. */
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH