Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-1271

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 70.3%
CVSS Severity
CVSS v3 Score 8.8
References
Products affected by CVE-2022-1271
  • Gnu » Gzip » Version: N/A
    cpe:2.3:a:gnu:gzip:-
  • Gnu » Gzip » Version: 1.10
    cpe:2.3:a:gnu:gzip:1.10
  • Gnu » Gzip » Version: 1.11
    cpe:2.3:a:gnu:gzip:1.11
  • Gnu » Gzip » Version: 1.2.4
    cpe:2.3:a:gnu:gzip:1.2.4
  • Gnu » Gzip » Version: 1.2.4a
    cpe:2.3:a:gnu:gzip:1.2.4a
  • Gnu » Gzip » Version: 1.3
    cpe:2.3:a:gnu:gzip:1.3
  • Gnu » Gzip » Version: 1.3.10
    cpe:2.3:a:gnu:gzip:1.3.10
  • Gnu » Gzip » Version: 1.3.11
    cpe:2.3:a:gnu:gzip:1.3.11
  • Gnu » Gzip » Version: 1.3.12
    cpe:2.3:a:gnu:gzip:1.3.12
  • Gnu » Gzip » Version: 1.3.13
    cpe:2.3:a:gnu:gzip:1.3.13
  • Gnu » Gzip » Version: 1.3.14
    cpe:2.3:a:gnu:gzip:1.3.14
  • Gnu » Gzip » Version: 1.3.3
    cpe:2.3:a:gnu:gzip:1.3.3
  • Gnu » Gzip » Version: 1.3.4
    cpe:2.3:a:gnu:gzip:1.3.4
  • Gnu » Gzip » Version: 1.3.5
    cpe:2.3:a:gnu:gzip:1.3.5
  • Gnu » Gzip » Version: 1.3.6
    cpe:2.3:a:gnu:gzip:1.3.6
  • Gnu » Gzip » Version: 1.3.7
    cpe:2.3:a:gnu:gzip:1.3.7
  • Gnu » Gzip » Version: 1.3.8
    cpe:2.3:a:gnu:gzip:1.3.8
  • Gnu » Gzip » Version: 1.3.9
    cpe:2.3:a:gnu:gzip:1.3.9
  • Gnu » Gzip » Version: 1.4
    cpe:2.3:a:gnu:gzip:1.4
  • Gnu » Gzip » Version: 1.5
    cpe:2.3:a:gnu:gzip:1.5
  • Gnu » Gzip » Version: 1.6
    cpe:2.3:a:gnu:gzip:1.6
  • Gnu » Gzip » Version: 1.7
    cpe:2.3:a:gnu:gzip:1.7
  • Gnu » Gzip » Version: 1.8
    cpe:2.3:a:gnu:gzip:1.8
  • Gnu » Gzip » Version: 1.9
    cpe:2.3:a:gnu:gzip:1.9
  • Redhat » Jboss Data Grid » Version: 7.0.0
    cpe:2.3:a:redhat:jboss_data_grid:7.0.0
  • Tukaani » Xz » Version: 4.42.2
    cpe:2.3:a:tukaani:xz:4.42.2
  • Tukaani » Xz » Version: 4.999.3
    cpe:2.3:a:tukaani:xz:4.999.3
  • Tukaani » Xz » Version: 4.999.5
    cpe:2.3:a:tukaani:xz:4.999.5
  • Tukaani » Xz » Version: 4.999.7
    cpe:2.3:a:tukaani:xz:4.999.7
  • Tukaani » Xz » Version: 4.999.8
    cpe:2.3:a:tukaani:xz:4.999.8
  • Tukaani » Xz » Version: 4.999.9
    cpe:2.3:a:tukaani:xz:4.999.9
  • Tukaani » Xz » Version: 5.0.0
    cpe:2.3:a:tukaani:xz:5.0.0
  • Tukaani » Xz » Version: 5.0.1
    cpe:2.3:a:tukaani:xz:5.0.1
  • Tukaani » Xz » Version: 5.0.2
    cpe:2.3:a:tukaani:xz:5.0.2
  • Tukaani » Xz » Version: 5.0.3
    cpe:2.3:a:tukaani:xz:5.0.3
  • Tukaani » Xz » Version: 5.0.4
    cpe:2.3:a:tukaani:xz:5.0.4
  • Tukaani » Xz » Version: 5.0.5
    cpe:2.3:a:tukaani:xz:5.0.5
  • Tukaani » Xz » Version: 5.0.6
    cpe:2.3:a:tukaani:xz:5.0.6
  • Tukaani » Xz » Version: 5.0.7
    cpe:2.3:a:tukaani:xz:5.0.7
  • Tukaani » Xz » Version: 5.0.8
    cpe:2.3:a:tukaani:xz:5.0.8
  • Tukaani » Xz » Version: 5.1.0
    cpe:2.3:a:tukaani:xz:5.1.0
  • Tukaani » Xz » Version: 5.1.1
    cpe:2.3:a:tukaani:xz:5.1.1
  • Tukaani » Xz » Version: 5.1.2
    cpe:2.3:a:tukaani:xz:5.1.2
  • Tukaani » Xz » Version: 5.1.3
    cpe:2.3:a:tukaani:xz:5.1.3
  • Tukaani » Xz » Version: 5.1.4
    cpe:2.3:a:tukaani:xz:5.1.4
  • Tukaani » Xz » Version: 5.2.0
    cpe:2.3:a:tukaani:xz:5.2.0
  • Tukaani » Xz » Version: 5.2.1
    cpe:2.3:a:tukaani:xz:5.2.1
  • Tukaani » Xz » Version: 5.2.2
    cpe:2.3:a:tukaani:xz:5.2.2
  • Tukaani » Xz » Version: 5.2.3
    cpe:2.3:a:tukaani:xz:5.2.3
  • Tukaani » Xz » Version: 5.2.4
    cpe:2.3:a:tukaani:xz:5.2.4
  • Debian » Debian Linux » Version: 10.0
    cpe:2.3:o:debian:debian_linux:10.0


Contact Us

Shodan ® - All rights reserved