Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2006-0663: ncompress


Vulnerability Assessment Details

RHSA-2006-0663: ncompress

Vulnerability Assessment Summary
Check for the version of the ncompress packages

Detailed Explanation for this Vulnerability Assessment


Updated ncompress packages that address a security issue and fix bugs are
now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

The ncompress package contains file compression and decompression
utilities, which are compatible with the original UNIX compress utility (.Z
file extensions).

Tavis Ormandy of the Google Security Team discovered a lack of bounds
checking in ncompress. A possible hacker could create a carefully crafted file
that could execute arbitrary code if uncompressed by a victim.
(CVE-2006-1168)

In addition, two bugs that affected Red Hat Enterprise Linux 4 ncompress
packages were fixed:

* The display statistics and compression results in verbose mode were not
shown when operating on zero length files.

* An attempt to compress zero length files resulted in an unexpected return
code.

Users of ncompress are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2006-0663.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Intel Xeon CPU Eight-Core E5-2690 (2.90GHz, 20M, 8.0GT/s) - SR0L0
$399.99
Intel Xeon CPU Eight-Core E5-2690 (2.90GHz, 20M, 8.0GT/s) - SR0L0 pictureIntel Xeon E5440 Processor(2.83GHz/12M/1333)close to LGA775 Core 2 Quad Q9650
$21.0
Intel Xeon E5440 Processor(2.83GHz/12M/1333)close to LGA775 Core 2 Quad Q9650  pictureDell PowerEdge R710 2x X5670 2.93GHz 6 Core 96GB 6x 146GB 15K SAS PERC 6/i
$905.0
Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 96GB 6x 146GB 15K SAS PERC 6/i pictureDell PowerEdge M630 Blade 2x E5-2630Lv3 64GB DDR4 2x 900GB 10K SAS H730, 57810-k
$2955.0
Dell PowerEdge M630 Blade 2x E5-2630Lv3 64GB DDR4 2x 900GB 10K SAS H730, 57810-k picture


Discussions

No Discussions have been posted on this vulnerability.