3.7
CVSSv2

CVE-2005-0988

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gzip 1.3.3

gnu gzip 1.2.4

gnu gzip 1.2.4a

freebsd freebsd 4.3

redhat enterprise linux 2.1

freebsd freebsd 4.1.1

freebsd freebsd 4.6

freebsd freebsd 5.4

freebsd freebsd 5.3

redhat enterprise linux 4.0

trustix secure linux 2.0

redhat enterprise linux desktop 3.0

freebsd freebsd 5.1

ubuntu ubuntu linux 4.1

redhat linux advanced workstation 2.1

freebsd freebsd 4.4

redhat enterprise linux 3.0

freebsd freebsd 4.8

turbolinux turbolinux appliance server 1.0 workgroup

freebsd freebsd 4.7

freebsd freebsd 5.2.1

freebsd freebsd 5.0

turbolinux turbolinux server 7.0

freebsd freebsd 4.5

ubuntu ubuntu linux 5.04

freebsd freebsd 4.10

freebsd freebsd 4.2

freebsd freebsd 4.11

freebsd freebsd 4.1

turbolinux turbolinux workstation 7.0

freebsd freebsd 4.9

freebsd freebsd 5.2

turbolinux turbolinux home

turbolinux turbolinux workstation 8.0

freebsd freebsd 4.0

turbolinux turbolinux appliance server 1.0 hosting

trustix secure linux 2.1

redhat enterprise linux desktop 4.0

trustix secure linux 2.2

turbolinux turbolinux server 8.0

turbolinux turbolinux server 10.0

gentoo linux

turbolinux turbolinux desktop 10.0

freebsd freebsd 4.6.2

Vendor Advisories

Synopsis gzip security update Type/Severity Security Advisory: Low Topic An updated gzip package is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description The gzip package contains the GNU gzip data compression programA bug ...
Imran Ghory discovered a race condition in the file permission restore code of gzip and gunzip While a user was compressing or decompressing a file, a local attacker with write permissions in the directory of that file could replace the target file with a hard link This would cause gzip to restore the file permissions to the hard link target ins ...