How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated bzip2 packages that fix multiple issues are now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
[Updated 13 February 2006] Replacement bzip2 packages for Red Hat
Enterprise Linux 4 have been created as the original erratum packages
did not fix CVE-2005-0758.
Bzip2 is a data compressor.
A bug was found in the way bzgrep processes file names. If a user can
be tricked into running bzgrep on a file with a carefully crafted file
name, arbitrary commands could be executed as the user running bzgrep.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0758 to this issue.
A bug was found in the way bzip2 modifies file permissions during
decompression. If an attacker has write access to the directory into
which bzip2 is decompressing files, it is possible for them to modify
permissions on files owned by the user running bzip2 (CVE-2005-0953).
A bug was found in the way bzip2 decompresses files. It is possible
for an attacker to create a specially crafted bzip2 file which will
cause bzip2 to cause a denial of service (by filling disk space) if
decompressed by a victim (CVE-2005-1260).
Users of Bzip2 should upgrade to these updated packages, which contain
backported patches to correct these issues.
See also :
Update the affected bzip2, bzip2-devel and / or bzip2-libs packages.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 18510 ()
CVE ID: CVE-2005-0758CVE-2005-0953CVE-2005-1260
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.