Results 1 to 1 of 1
-
29th Jun 2014, 01:29 PM #1
LZO Algorithm Patched After 20 Years
For as much as 20 years, all versions of the Lempel–Ziv–Oberhumer (LZO) algorithm for compression and decompression have been vulnerable to remote code execution and denial-of-service type of attacks.
The flaw has lasted this long and has been perpetuated in all variants of the algorithm because every new implementation featured the core open-source code.
Don A. Bailey, founder and CEO of Lab Mouse Security, disclosed the technical details revealing that at fault was an integer overflow bug occurring when processing a Literal Run, a piece of data that is not actually compressed.
Since it was designed by Markus Oberhumer back in 1994, the LZO algorithm has gained popularity because of the efficient compression it provided, and today it is widely used in various devices and systems.
It has been integrated into the Linux kernel, Samsung implemented it in some Android phones and even NASA added it to the Mars Curiosity Rover (which means that LZO made it to Mars). However, it is also present in projects for the regular user, such as OpenVPN, FFmpeg, Libav or MPlayer2.
To better understand how wide-spread the algorithm is, Oberhumer says that “if you do have a car, a mobile telephone, a computer, a console, or have been to hospital recently, there's a good chance that you have been in contact with our embedded data compression technology.”
Provided its pervasiveness, the risk presented by the vulnerability is significant. However, because LZO has been modified numerous times to adapt to open or closed systems, a potential attacker should have to build custom malicious payloads for each implementation.
Also, even if the risk of a denial-of-service attack does exist, this is not possible in all versions. In the case of remote code execution there are platform and architecture restrictions that should be taken into consideration by a threat actor before deploying an attack.
At the moment, all vendors should offer patched versions of the LZO, and users are advised to update as soon as possible.
According to Bailey, finding out if a specific implementation is vulnerable consists in determining the maximum chunk size processed by the decompression routine. In an unaffected version, only buffers lower than 16MB can be passed to the LZO or LZ4 decompress routine.
Bailey recommends that all users of FFmpeg and Libav, along with all projects depending on them, should update their software because there is the possibility of remote code execution. Not using them is also one way to avoid the risk.Kepler Reviewed by Kepler on . LZO Algorithm Patched After 20 Years http://i1-news.softpedia-static.com/images/news-700/LZO-Algorithm-Patched-After-20-Years.jpg For as much as 20 years, all versions of the Lempel–Ziv–Oberhumer (LZO) algorithm for compression and decompression have been vulnerable to remote code execution and denial-of-service type of attacks. The flaw has lasted this long and has been perpetuated in all variants of the algorithm because every new implementation featured the core open-source code. Don A. Bailey, founder and Rating: 5
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
Pak Won Hockey Gold After 20 Years
By -saMmy- in forum General DiscussionReplies: 22Last Post: 26th Nov 2010, 01:45 AM -
[Shared] OffShore Reseller $20 Year
By Angeix in forum ArchiveReplies: 1Last Post: 7th Feb 2010, 08:32 AM -
[Shared] Uk1Host Netherlands Master Reseller $20 Year Free .co.uk
By Angeix in forum ArchiveReplies: 6Last Post: 6th Dec 2009, 11:25 AM -
[Shared] Ultimated Master Reseller $20 Year
By Angeix in forum ArchiveReplies: 5Last Post: 6th Dec 2009, 02:38 AM -
[Shared] Ultimated Master Reseller $20 Year Offshore
By Angeix in forum ArchiveReplies: 0Last Post: 1st Dec 2009, 01:16 PM
themaCreator - create posts from...
Version 3.27 released. Open older version (or...