Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-1391

Published: 16 June 2009

Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.

Priority

Medium

Status

Package Release Status
libcompress-raw-zlib-perl
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy
Released (2.008-1ubuntu0.1)
intrepid
Released (2.011-2ubuntu0.1)
jaunty
Released (2.015-1ubuntu0.1)
upstream
Released (2.017)
Patches:
distro: http://patch-tracking.debian.net/patch/series/view/libcompress-raw-zlib-perl/2.015-2/CVE-2009-1391

perl
Launchpad, Ubuntu, Debian
dapper Not vulnerable
(code not present)
hardy Not vulnerable
(code not present)
intrepid
Released (5.10.0-11.1ubuntu2.3)
jaunty
Released (5.10.0-19ubuntu1.1)
upstream Needs triage

Patches:

distro: http://patch-tracking.debian.net/patch/misc/view/perl/5.10.0-23/ext/Compress/Raw/Zlib/Zlib.xs