Debian DSA-2112-1 : bzip2 - integer overflow

Medium Nessus Plugin ID 49291


The remote Debian host is missing a security-related update.


Mikolaj Izdebski has discovered an integer overflow flaw in the BZ2_decompress function in bzip2/libbz2. An attacker could use a crafted bz2 file to cause a denial of service (application crash) or potentially to execute arbitrary code. (CVE-2010-0405 )


Upgrade the bzip2 / dpkg packages.

After the upgrade, all running services that use libbz2 need to be restarted.

This update also provides rebuilt dpkg packages, which are statically linked to the fixed version of libbz2. Updated packages for clamav, which is also affected by this issue, will be provided on debian-volatile.

For the stable distribution (lenny), this problem has been fixed in version 1.0.5-1+lenny1.

See Also

Plugin Details

Severity: Medium

ID: 49291

File Name: debian_DSA-2112.nasl

Version: 1.17

Type: local

Agent: unix

Published: 2010/09/21

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:bzip2, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/09/20

Reference Information

CVE: CVE-2010-0405

DSA: 2112

IAVB: 2010-B-0083