Debian DSA-2112-1 : bzip2 - integer overflow

medium Nessus Plugin ID 49291

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Mikolaj Izdebski has discovered an integer overflow flaw in the BZ2_decompress function in bzip2/libbz2. An attacker could use a crafted bz2 file to cause a denial of service (application crash) or potentially to execute arbitrary code. (CVE-2010-0405 )

Solution

Upgrade the bzip2 / dpkg packages.

After the upgrade, all running services that use libbz2 need to be restarted.

This update also provides rebuilt dpkg packages, which are statically linked to the fixed version of libbz2. Updated packages for clamav, which is also affected by this issue, will be provided on debian-volatile.

For the stable distribution (lenny), this problem has been fixed in version 1.0.5-1+lenny1.

See Also

https://security-tracker.debian.org/tracker/CVE-2010-0405

https://www.debian.org/security/2010/dsa-2112

Plugin Details

Severity: Medium

ID: 49291

File Name: debian_DSA-2112.nasl

Version: 1.18

Type: local

Agent: unix

Published: 9/21/2010

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:bzip2, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/20/2010

Reference Information

CVE: CVE-2010-0405

DSA: 2112

IAVB: 2010-B-0083