Access Restriction Bypass Affecting bzip2 package, versions <1.0.6-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-BZIP2-5676185
  • published16 Apr 2014
  • disclosed16 Apr 2014

Introduced: 16 Apr 2014

CVE-2011-4089  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:13 bzip2 to version 1.0.6-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bzip2 package and not the bzip2 package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVSS Scores

version 3.1