Description
Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.
Published: 2006-09-19
Score: 7.5 High
EPSS: 13.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1181-1 New gzip packages fix arbitrary code execution
EUVD EUVD EUVD-2006-4324 Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.
Ubuntu USN Ubuntu USN USN-349-1 gzip vulnerabilities
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc cve-icon cve-icon
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=304829 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html cve-icon cve-icon
http://secunia.com/advisories/21996 cve-icon cve-icon
http://secunia.com/advisories/22002 cve-icon cve-icon
http://secunia.com/advisories/22009 cve-icon cve-icon
http://secunia.com/advisories/22012 cve-icon cve-icon
http://secunia.com/advisories/22017 cve-icon cve-icon
http://secunia.com/advisories/22027 cve-icon cve-icon
http://secunia.com/advisories/22033 cve-icon cve-icon
http://secunia.com/advisories/22034 cve-icon cve-icon
http://secunia.com/advisories/22043 cve-icon cve-icon
http://secunia.com/advisories/22085 cve-icon cve-icon
http://secunia.com/advisories/22101 cve-icon cve-icon
http://secunia.com/advisories/22435 cve-icon cve-icon
http://secunia.com/advisories/22487 cve-icon cve-icon
http://secunia.com/advisories/22661 cve-icon cve-icon
http://secunia.com/advisories/23153 cve-icon cve-icon
http://secunia.com/advisories/23155 cve-icon cve-icon
http://secunia.com/advisories/23156 cve-icon cve-icon
http://secunia.com/advisories/23679 cve-icon cve-icon
http://secunia.com/advisories/24435 cve-icon cve-icon
http://secunia.com/advisories/24636 cve-icon cve-icon
http://security.freebsd.org/advisories/FreeBSD-SA-06:21.gzip.asc cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200609-13.xml cve-icon cve-icon
http://securitytracker.com/id?1016883 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102766-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-218.htm cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200611-24.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/554780 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:167 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_56_gzip.html cve-icon cve-icon
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.020-gzip.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0667.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/446426/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/450078/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/451324/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/462007/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/464268/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/20101 cve-icon cve-icon
http://www.trustix.org/errata/2006/0052/ cve-icon cve-icon
http://www.ubuntu.com/usn/usn-349-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA06-333A.html cve-icon cve-icon
http://www.us.debian.org/security/2006/dsa-1181 cve-icon cve-icon
http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3695 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4275 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4750 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4760 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0092 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0832 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/1171 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/29042 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-615 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-4336 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10140 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-4336 cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02306}

epss

{'score': 0.04562}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02291}

epss

{'score': 0.02306}


Subscriptions

Gzip Gzip
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T19:06:07.625Z

Reserved: 2006-08-24T00:00:00.000Z

Link: CVE-2006-4336

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-09-19T21:07:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2006-4336

cve-icon Redhat

Severity : Low

Publid Date: 2006-12-02T00:00:00Z

Links: CVE-2006-4336 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses