CVE-2005-0953 Affecting bzip2 package, versions <1.0.2-6
Threat Intelligence
EPSS
0.08% (33rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-BZIP2-284297
- published 2 May 2005
- disclosed 2 May 2005
Introduced: 2 May 2005
CVE-2005-0953 Open this link in a new tabHow to fix?
Upgrade Debian:9 bzip2 to version 1.0.2-6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bzip2 package and not the bzip2 package as distributed by Debian.
See How to fix? for Debian:9 relevant fixed versions and status.
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
References
- https://security-tracker.debian.org/tracker/CVE-2005-0953
- http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
- http://www.securityfocus.com/archive/1/456430/30/8730/threaded
- http://www.us-cert.gov/cas/techalerts/TA07-319A.html
- http://docs.info.apple.com/article.html?artnum=307041
- http://www.debian.org/security/2005/dsa-730
- http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
- http://marc.info/?l=bugtraq&m=111229375217633&w=2
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154
- http://secunia.com/advisories/19183
- http://secunia.com/advisories/27274
- http://secunia.com/advisories/27643
- http://secunia.com/advisories/29940
- http://www.securityfocus.com/bid/12954
- http://www.securityfocus.com/bid/26444
- ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
- http://www.vupen.com/english/advisories/2007/3525
- http://www.vupen.com/english/advisories/2007/3868
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19926
- http://www.redhat.com/support/errata/RHSA-2005-474.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
CVSS Scores
version 3.1