CVE-2009-1391

EXPLOITED IN THE WILD

Paul Marquess Compress-raw-zlib Perl Module < 2.015 - Numeric Error

Title source: rule

Description

Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Leo Bergolth · textremotelinux
https://www.exploit-db.com/exploits/33032

Scores

EPSS 0.1837
EPSS Percentile 95.2%

Details

VulnCheck KEV 2009-06-16
InTheWild.io 2018-10-03
CWE
CWE-189
Status published
Products (13)
paul_marquess/compress-raw-zlib_perl_module 2.001
paul_marquess/compress-raw-zlib_perl_module 2.002
paul_marquess/compress-raw-zlib_perl_module 2.003
paul_marquess/compress-raw-zlib_perl_module 2.004
paul_marquess/compress-raw-zlib_perl_module 2.005
paul_marquess/compress-raw-zlib_perl_module 2.006
paul_marquess/compress-raw-zlib_perl_module 2.008
paul_marquess/compress-raw-zlib_perl_module 2.009
paul_marquess/compress-raw-zlib_perl_module 2.010
paul_marquess/compress-raw-zlib_perl_module 2.011
... and 3 more
Published Jun 16, 2009
Tracked Since Feb 18, 2026