CVE-2009-1391
EXPLOITED IN THE WILDPaul Marquess Compress-raw-zlib Perl Module < 2.015 - Numeric Error
Title source: ruleDescription
Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Leo Bergolth · textremotelinux
https://www.exploit-db.com/exploits/33032
References (18)
Scores
EPSS
0.1837
EPSS Percentile
95.2%
Details
VulnCheck KEV
2009-06-16
InTheWild.io
2018-10-03
CWE
CWE-189
Status
published
Products (13)
paul_marquess/compress-raw-zlib_perl_module
2.001
paul_marquess/compress-raw-zlib_perl_module
2.002
paul_marquess/compress-raw-zlib_perl_module
2.003
paul_marquess/compress-raw-zlib_perl_module
2.004
paul_marquess/compress-raw-zlib_perl_module
2.005
paul_marquess/compress-raw-zlib_perl_module
2.006
paul_marquess/compress-raw-zlib_perl_module
2.008
paul_marquess/compress-raw-zlib_perl_module
2.009
paul_marquess/compress-raw-zlib_perl_module
2.010
paul_marquess/compress-raw-zlib_perl_module
2.011
... and 3 more
Published
Jun 16, 2009
Tracked Since
Feb 18, 2026