CVE-2009-1391

Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
paul_marquesscompress-raw-zlib_perl_module
𝑥
≤ 2.015
paul_marquesscompress-raw-zlib_perl_module
2.001
paul_marquesscompress-raw-zlib_perl_module
2.002
paul_marquesscompress-raw-zlib_perl_module
2.003
paul_marquesscompress-raw-zlib_perl_module
2.004
paul_marquesscompress-raw-zlib_perl_module
2.005
paul_marquesscompress-raw-zlib_perl_module
2.006
paul_marquesscompress-raw-zlib_perl_module
2.008
paul_marquesscompress-raw-zlib_perl_module
2.009
paul_marquesscompress-raw-zlib_perl_module
2.010
paul_marquesscompress-raw-zlib_perl_module
2.011
paul_marquesscompress-raw-zlib_perl_module
2.012
paul_marquesscompress-raw-zlib_perl_module
2.014
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcompress-raw-zlib-perl
bullseye
2.101-1
fixed
etch
not-affected
bookworm
2.204-1
fixed
sid
2.213-1
fixed
trixie
2.213-1
fixed
perl
bullseye
5.32.1-4+deb11u3
fixed
etch
not-affected
bullseye (security)
5.32.1-4+deb11u4
fixed
bookworm
5.36.0-7+deb12u1
fixed
sid
5.40.0-6
fixed
trixie
5.40.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcompress-raw-zlib-perl
jaunty
Fixed 2.015-1ubuntu0.1
released
intrepid
Fixed 2.011-2ubuntu0.1
released
hardy
Fixed 2.008-1ubuntu0.1
released
dapper
dne
perl
jaunty
Fixed 5.10.0-19ubuntu1.1
released
intrepid
Fixed 5.10.0-11.1ubuntu2.3
released
hardy
not-affected
dapper
not-affected
Common Weakness Enumeration
References