3.7
CVSSv2

CVE-2005-0953

Published: 02/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in bzip2 1.0.2 and previous versions allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.

Vulnerable Product Search on Vulmon Subscribe to Product

bzip bzip2 0.9.5_d

bzip bzip2 0.9_a

bzip bzip2 0.9

bzip bzip2 0.9.5_a

bzip bzip2 1.0

bzip bzip2 1.0.1

bzip bzip2 1.0.2

bzip bzip2 0.9.5_b

bzip bzip2 0.9.5_c

bzip bzip2 0.9_b

bzip bzip2 0.9_c

Vendor Advisories

Synopsis bzip2 security update Type/Severity Security Advisory: Low Topic Updated bzip2 packages that fix multiple issues are now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team[Updated 13 February 2006]Replacement bzip2 packages for Red Hat Enterpris ...
Imran Ghory discovered a race condition in the file permission restore code of bunzip2 While a user was decompressing a file, a local attacker with write permissions in the directory of that file could replace the target file with a hard link This would cause bzip2 to restore the file permissions to the hard link target instead of to the bzip2 ou ...
Imran Ghory discovered a race condition in bzip2, a high-quality block-sorting file compressor and decompressor When decompressing a file in a directory an attacker has access to, bunzip2 could be tricked to set the file permissions to a different file the user has permissions to For the stable distribution (woody) this problem has been fixed in ...

References

NVD-CWE-Otherhttp://www.securityfocus.com/bid/12954http://www.debian.org/security/2005/dsa-730http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.htmlhttp://www.redhat.com/support/errata/RHSA-2005-474.htmlftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.aschttp://secunia.com/advisories/19183http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.htmlhttp://docs.info.apple.com/article.html?artnum=307041http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.htmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:026http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1http://www.us-cert.gov/cas/techalerts/TA07-319A.htmlhttp://www.securityfocus.com/bid/26444http://secunia.com/advisories/27274http://secunia.com/advisories/27643http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.aschttp://secunia.com/advisories/29940http://www.vupen.com/english/advisories/2007/3868http://www.vupen.com/english/advisories/2007/3525http://marc.info/?l=bugtraq&m=111229375217633&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/19926https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902http://www.securityfocus.com/archive/1/456430/30/8730/threadedhttps://access.redhat.com/errata/RHSA-2005:474https://usn.ubuntu.com/127-1/https://nvd.nist.gov