Name | CVE-2009-1391 |
Description | Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 532736, 532738 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libcompress-raw-zlib-perl (PTS) | bullseye | 2.101-1 | fixed |
bookworm | 2.204-1 | fixed | |
sid, trixie | 2.213-1 | fixed | |
perl (PTS) | bullseye | 5.32.1-4+deb11u3 | fixed |
bullseye (security) | 5.32.1-4+deb11u4 | fixed | |
bookworm | 5.36.0-7+deb12u1 | fixed | |
sid, trixie | 5.40.0-7 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libcompress-raw-zlib-perl | source | lenny | 2.012-1lenny1 | |||
libcompress-raw-zlib-perl | source | (unstable) | 2.015-2 | low | 532738 | |
perl | source | etch | (not affected) | |||
perl | source | lenny | 5.10.0-19lenny1 | |||
perl | source | (unstable) | 5.10.0-23 | low | 532736 |
[etch] - perl <not-affected> (Doesn't yet include Compress-Raw-Zlib)