Vulnerabilites related to ncompress - ncompress
cve-2005-2991
Vulnerability from cvelistv5
Published
2005-09-20 04:00
Modified
2024-08-07 22:53
Severity ?
Summary
ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970.
References
http://securityreason.com/securityalert/12third-party-advisory, x_refsource_SREASON
http://marc.info/?l=full-disclosure&m=112688098630314&w=2mailing-list, x_refsource_FULLDISC
http://marc.info/?l=bugtraq&m=112689772732098&w=2mailing-list, x_refsource_BUGTRAQ
http://www.zataz.net/adviso/ncompress-09052005.txtx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:29.867Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "12",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/12"
          },
          {
            "name": "20050916 ncompress insecure temporary file creation",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=112688098630314\u0026w=2"
          },
          {
            "name": "20050916 ncompress insecure temporary file creation",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112689772732098\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "12",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/12"
        },
        {
          "name": "20050916 ncompress insecure temporary file creation",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=112688098630314\u0026w=2"
        },
        {
          "name": "20050916 ncompress insecure temporary file creation",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112689772732098\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2005-2991",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "12",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/12"
            },
            {
              "name": "20050916 ncompress insecure temporary file creation",
              "refsource": "FULLDISC",
              "url": "http://marc.info/?l=full-disclosure\u0026m=112688098630314\u0026w=2"
            },
            {
              "name": "20050916 ncompress insecure temporary file creation",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112689772732098\u0026w=2"
            },
            {
              "name": "http://www.zataz.net/adviso/ncompress-09052005.txt",
              "refsource": "MISC",
              "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-2991",
    "datePublished": "2005-09-20T04:00:00",
    "dateReserved": "2005-09-20T00:00:00",
    "dateUpdated": "2024-08-07T22:53:29.867Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2001-1413
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 04:51
Severity ?
Summary
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
References
http://security.gentoo.org/glsa/glsa-200410-08.xmlvendor-advisory, x_refsource_GENTOO
http://seclists.org/lists/vuln-dev/2001/Nov/0202.htmlmailing-list, x_refsource_VULN-DEV
http://www.redhat.com/support/errata/RHSA-2004-536.htmlvendor-advisory, x_refsource_REDHAT
http://www.kb.cert.org/vuls/id/176363third-party-advisory, x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/10619vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:51:08.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200410-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200410-08.xml"
          },
          {
            "name": "20010621 New bugs, old bugs",
            "tags": [
              "mailing-list",
              "x_refsource_VULN-DEV",
              "x_transferred"
            ],
            "url": "http://seclists.org/lists/vuln-dev/2001/Nov/0202.html"
          },
          {
            "name": "RHSA-2004:536",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-536.html"
          },
          {
            "name": "VU#176363",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/176363"
          },
          {
            "name": "ncompress-filename-bo(10619)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10619"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200410-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200410-08.xml"
        },
        {
          "name": "20010621 New bugs, old bugs",
          "tags": [
            "mailing-list",
            "x_refsource_VULN-DEV"
          ],
          "url": "http://seclists.org/lists/vuln-dev/2001/Nov/0202.html"
        },
        {
          "name": "RHSA-2004:536",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-536.html"
        },
        {
          "name": "VU#176363",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/176363"
        },
        {
          "name": "ncompress-filename-bo(10619)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10619"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1413",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200410-08",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200410-08.xml"
            },
            {
              "name": "20010621 New bugs, old bugs",
              "refsource": "VULN-DEV",
              "url": "http://seclists.org/lists/vuln-dev/2001/Nov/0202.html"
            },
            {
              "name": "RHSA-2004:536",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-536.html"
            },
            {
              "name": "VU#176363",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/176363"
            },
            {
              "name": "ncompress-filename-bo(10619)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10619"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1413",
    "datePublished": "2004-10-20T04:00:00",
    "dateReserved": "2004-10-18T00:00:00",
    "dateUpdated": "2024-08-08T04:51:08.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-1168
Vulnerability from cvelistv5
Published
2006-08-14 20:00
Modified
2024-08-07 17:03
Severity ?
Summary
The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.
References
http://secunia.com/advisories/21437third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/28315vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200610-03.xmlvendor-advisory, x_refsource_GENTOO
http://www.novell.com/linux/security/advisories/2006_20_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDKSA-2006:140vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/22296third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/19455vdb-entry, x_refsource_BID
http://downloads.avaya.com/css/P8/documents/100158840x_refsource_CONFIRM
http://bugs.gentoo.org/show_bug.cgi?id=141728x_refsource_MISC
http://secunia.com/advisories/21434third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1149vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/21467third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2006-226.htmx_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.ascvendor-advisory, x_refsource_SGI
http://www.redhat.com/support/errata/RHSA-2006-0663.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/3234vdb-entry, x_refsource_VUPEN
http://rhn.redhat.com/errata/RHSA-2012-0810.htmlvendor-advisory, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=728536x_refsource_MISC
http://secunia.com/advisories/22377third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21427third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016836vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/22036third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/21880third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2012:129vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.264Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21437",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21437"
          },
          {
            "name": "ncompress-decompress-underflow(28315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28315"
          },
          {
            "name": "GLSA-200610-03",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200610-03.xml"
          },
          {
            "name": "SUSE-SR:2006:020",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
          },
          {
            "name": "MDKSA-2006:140",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:140"
          },
          {
            "name": "22296",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22296"
          },
          {
            "name": "oval:org.mitre.oval:def:9373",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373"
          },
          {
            "name": "19455",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19455"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://downloads.avaya.com/css/P8/documents/100158840"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=141728"
          },
          {
            "name": "21434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21434"
          },
          {
            "name": "DSA-1149",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1149"
          },
          {
            "name": "21467",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21467"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm"
          },
          {
            "name": "20060901-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
          },
          {
            "name": "RHSA-2006:0663",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0663.html"
          },
          {
            "name": "ADV-2006-3234",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3234"
          },
          {
            "name": "RHSA-2012:0810",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0810.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728536"
          },
          {
            "name": "22377",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22377"
          },
          {
            "name": "21427",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21427"
          },
          {
            "name": "1016836",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016836"
          },
          {
            "name": "22036",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22036"
          },
          {
            "name": "21880",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21880"
          },
          {
            "name": "MDVSA-2012:129",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
        "shortName": "sgi"
      },
      "references": [
        {
          "name": "21437",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21437"
        },
        {
          "name": "ncompress-decompress-underflow(28315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28315"
        },
        {
          "name": "GLSA-200610-03",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200610-03.xml"
        },
        {
          "name": "SUSE-SR:2006:020",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
        },
        {
          "name": "MDKSA-2006:140",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:140"
        },
        {
          "name": "22296",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22296"
        },
        {
          "name": "oval:org.mitre.oval:def:9373",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373"
        },
        {
          "name": "19455",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19455"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://downloads.avaya.com/css/P8/documents/100158840"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=141728"
        },
        {
          "name": "21434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21434"
        },
        {
          "name": "DSA-1149",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1149"
        },
        {
          "name": "21467",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21467"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm"
        },
        {
          "name": "20060901-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
        },
        {
          "name": "RHSA-2006:0663",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0663.html"
        },
        {
          "name": "ADV-2006-3234",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3234"
        },
        {
          "name": "RHSA-2012:0810",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0810.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728536"
        },
        {
          "name": "22377",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22377"
        },
        {
          "name": "21427",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21427"
        },
        {
          "name": "1016836",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016836"
        },
        {
          "name": "22036",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22036"
        },
        {
          "name": "21880",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21880"
        },
        {
          "name": "MDVSA-2012:129",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-info@sgi.com",
          "ID": "CVE-2006-1168",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21437",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21437"
            },
            {
              "name": "ncompress-decompress-underflow(28315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28315"
            },
            {
              "name": "GLSA-200610-03",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200610-03.xml"
            },
            {
              "name": "SUSE-SR:2006:020",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
            },
            {
              "name": "MDKSA-2006:140",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:140"
            },
            {
              "name": "22296",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22296"
            },
            {
              "name": "oval:org.mitre.oval:def:9373",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373"
            },
            {
              "name": "19455",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19455"
            },
            {
              "name": "http://downloads.avaya.com/css/P8/documents/100158840",
              "refsource": "CONFIRM",
              "url": "http://downloads.avaya.com/css/P8/documents/100158840"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=141728",
              "refsource": "MISC",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=141728"
            },
            {
              "name": "21434",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21434"
            },
            {
              "name": "DSA-1149",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1149"
            },
            {
              "name": "21467",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21467"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm"
            },
            {
              "name": "20060901-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
            },
            {
              "name": "RHSA-2006:0663",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0663.html"
            },
            {
              "name": "ADV-2006-3234",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3234"
            },
            {
              "name": "RHSA-2012:0810",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2012-0810.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=728536",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728536"
            },
            {
              "name": "22377",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22377"
            },
            {
              "name": "21427",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21427"
            },
            {
              "name": "1016836",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016836"
            },
            {
              "name": "22036",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22036"
            },
            {
              "name": "21880",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21880"
            },
            {
              "name": "MDVSA-2012:129",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
    "assignerShortName": "sgi",
    "cveId": "CVE-2006-1168",
    "datePublished": "2006-08-14T20:00:00",
    "dateReserved": "2006-03-12T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.264Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2024-11-20 23:37
Severity ?
Summary
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
Impacted products
Vendor Product Version
ncompress ncompress *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ncompress:ncompress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "008D3D9D-E146-4A74-8A92-815A51095085",
              "versionEndIncluding": "4.2.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en la pila en la funci\u00f3n comprexx de ncompress 4.2.4 y anteriores, cuando se utiliza en situaciones que cruzan l\u00edmites de seguridad (como servidores FTP), puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento de nombre de fichero largo."
    }
  ],
  "id": "CVE-2001-1413",
  "lastModified": "2024-11-20T23:37:38.147",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-23T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/lists/vuln-dev/2001/Nov/0202.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200410-08.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/176363"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-536.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/lists/vuln-dev/2001/Nov/0202.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200410-08.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/176363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-536.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10619"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-09-20 20:03
Modified
2024-11-21 00:00
Severity ?
Summary
ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970.
Impacted products
Vendor Product Version
ncompress ncompress *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ncompress:ncompress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6EBAF3-A0BB-4E0B-9D26-80E824594F2E",
              "versionEndIncluding": "4.2.4_r1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970."
    }
  ],
  "id": "CVE-2005-2991",
  "lastModified": "2024-11-21T00:00:52.990",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-20T20:03:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=112689772732098\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=full-disclosure\u0026m=112688098630314\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/12"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112689772732098\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=112688098630314\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zataz.net/adviso/ncompress-09052005.txt"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  This issue did not affect the ncompress packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.",
      "lastModified": "2006-08-30T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-14 20:04
Modified
2024-11-21 00:08
Severity ?
Summary
The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.
References
bc94ec7e-8909-4cbb-83df-d2fc9330fa88ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://bugs.gentoo.org/show_bug.cgi?id=141728
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://downloads.avaya.com/css/P8/documents/100158840
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://rhn.redhat.com/errata/RHSA-2012-0810.html
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/21427
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/21434
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/21437
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/21467
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/21880
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/22036
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/22296
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://secunia.com/advisories/22377
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://security.gentoo.org/glsa/glsa-200610-03.xml
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://securitytracker.com/id?1016836
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.debian.org/security/2006/dsa-1149
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.mandriva.com/security/advisories?name=MDKSA-2006:140
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.mandriva.com/security/advisories?name=MDVSA-2012:129
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.novell.com/linux/security/advisories/2006_20_sr.html
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.redhat.com/support/errata/RHSA-2006-0663.html
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.securityfocus.com/bid/19455
bc94ec7e-8909-4cbb-83df-d2fc9330fa88http://www.vupen.com/english/advisories/2006/3234
bc94ec7e-8909-4cbb-83df-d2fc9330fa88https://bugzilla.redhat.com/show_bug.cgi?id=728536
bc94ec7e-8909-4cbb-83df-d2fc9330fa88https://exchange.xforce.ibmcloud.com/vulnerabilities/28315
bc94ec7e-8909-4cbb-83df-d2fc9330fa88https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=141728
af854a3a-2127-422b-91ae-364da2661108http://downloads.avaya.com/css/P8/documents/100158840
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-0810.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21427
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21434
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21437
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21467
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21880
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22036
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22296
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22377
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200610-03.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016836
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1149
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:140
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:129
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_20_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0663.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19455
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3234
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=728536
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28315
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373
Impacted products
Vendor Product Version
ncompress ncompress 4.2.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ncompress:ncompress:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0FDFAB-53CE-409D-9E97-14A1E50CEBED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n decompress en compress42.c en (1) ncompress 4.2.4 y (2) liblzw permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda), y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n, mediante datos manipulados que llevan a un desbordamiento inferior de b\u00fafer."
    }
  ],
  "id": "CVE-2006-1168",
  "lastModified": "2024-11-21T00:08:14.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-14T20:04:00.000",
  "references": [
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=141728"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://downloads.avaya.com/css/P8/documents/100158840"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0810.html"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/21427"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/21434"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/21437"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/21467"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/21880"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/22036"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/22296"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://secunia.com/advisories/22377"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://security.gentoo.org/glsa/glsa-200610-03.xml"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://securitytracker.com/id?1016836"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.debian.org/security/2006/dsa-1149"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:140"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0663.html"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.securityfocus.com/bid/19455"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "http://www.vupen.com/english/advisories/2006/3234"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728536"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28315"
    },
    {
      "source": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=141728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://downloads.avaya.com/css/P8/documents/100158840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0810.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21437"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200610-03.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-226.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0663.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3234"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9373"
    }
  ],
  "sourceIdentifier": "bc94ec7e-8909-4cbb-83df-d2fc9330fa88",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}