what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenPKG Security Advisory 2007.2

OpenPKG Security Advisory 2007.2
Posted Jan 13, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - Together with two portability and stability issues, two older security issues were fixed in the compression tool BZip2, versions up to and including 1.0.3.

tags | advisory
advisories | CVE-2005-0953, CVE-2005-0758
SHA-256 | 25542668c12c677ad1d31a4513dd6892ca204cb22b1f1399da1eda9ec286b7cd

OpenPKG Security Advisory 2007.2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________

Publisher Name: OpenPKG GmbH
Publisher Home: http://openpkg.com/

Advisory Id (public): OpenPKG-SA-2007.002
Advisory Type: OpenPKG Security Advisory (SA)
Advisory Directory: http://openpkg.com/go/OpenPKG-SA
Advisory Document: http://openpkg.com/go/OpenPKG-SA-2007.002
Advisory Published: 2007-01-05 21:58 UTC

Issue Id (internal): OpenPKG-SI-20070105.01
Issue First Created: 2007-01-05
Issue Last Modified: 2007-01-05
Issue Revision: 04
____________________________________________________________________________

Subject Name: bzip2
Subject Summary: Compression Tool
Subject Home: http://www.bzip.org/
Subject Versions: * <= 1.0.3

Vulnerability Id: CVE-2005-0953, CVE-2005-0758
Vulnerability Scope: global (not OpenPKG specific)

Attack Feasibility: run-time
Attack Vector: local system
Attack Impact: manipulation of data, arbitrary code execution

Description:
Together with two portability and stability issues, two older
security issues were fixed in the compression tool BZip2 [0], versions
up to and including 1.0.3.

The first issue is a race condition which allows local users to
modify permissions of arbitrary files via a hard link attack on a
file while it is being decompressed, whose permissions are changed
by bzip2 after the decompression is complete.

The second issue affects the script bzgrep(1). It does not properly
sanitize arguments, which allows local users to execute arbitrary
commands via filenames that are injected into a sed(1) script.

References:
[0] http://www.bzip.org/
____________________________________________________________________________

Primary Package Name: bzip2
Primary Package Home: http://openpkg.org/go/package/bzip2

Corrected Distribution: Corrected Branch: Corrected Package:
OpenPKG Enterprise E1.0-SOLID bzip2-1.0.3-E1.0.1
OpenPKG Enterprise E1.0-SOLID openpkg-E1.0.2-E1.0.2
OpenPKG Community 2-STABLE-20061018 bzip2-1.0.4-2.20070105
OpenPKG Community 2-STABLE-20061018 openpkg-2.20070105-2.20070105
OpenPKG Community 2-STABLE bzip2-1.0.4-2.20070105
OpenPKG Community 2-STABLE openpkg-2.20070105-2.20070105
OpenPKG Community CURRENT bzip2-1.0.4-20070105
OpenPKG Community CURRENT openpkg-20070105-20070105
____________________________________________________________________________

For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <http://openpkg.com/>

iD8DBQFFnrwRZwQuyWG3rjQRAgkdAJ9YBx7auj7ursOTj5M/78Kq3SlGlACfc0aV
2IRFnTk4CCJwa9FPgv1z7c0=
=Iq2w
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close