Vulnerability Details : CVE-2005-0953
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
Products affected by CVE-2005-0953
- cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0953
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0953
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.7
|
LOW | AV:L/AC:H/Au:N/C:P/I:P/A:P |
1.9
|
6.4
|
NIST |
Vendor statements for CVE-2005-0953
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2005-0953
-
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
-
http://www.us-cert.gov/cas/techalerts/TA07-319A.html
Page Not Found | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2007/3525
Site en construction
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154
404 Not Found
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902
404 Not Found
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
-
http://www.securityfocus.com/bid/12954
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/19926
-
http://www.redhat.com/support/errata/RHSA-2005-474.html
Support
-
http://www.vupen.com/english/advisories/2007/3868
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.securityfocus.com/bid/26444
-
http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
404 Not Found
-
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
Mandriva
-
http://www.debian.org/security/2005/dsa-730
[SECURITY] [DSA 730-1] New bzip2 packages fix file unauthorised permissions modificationPatch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=111229375217633&w=2
'bzip2 TOCTOU file-permissions vulnerability' - MARC
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
-
http://docs.info.apple.com/article.html?artnum=307041
-
http://www.securityfocus.com/archive/1/456430/30/8730/threaded
-
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
Jump to