Lucene search

K
freebsdFreeBSD63BD4BAD-DFFE-11D9-B875-0001020EED82
HistoryApr 20, 2005 - 12:00 a.m.

gzip -- directory traversal and permission race vulnerabilities

2005-04-2000:00:00
vuxml.freebsd.org
12

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.5%

Problem Description
Two problems related to extraction of files exist in gzip:
The first problem is that gzip does not properly sanitize
filenames containing “/” when uncompressing files using the
-N command line option.
The second problem is that gzip does not set permissions on
newly extracted files until after the file has been created
and the file descriptor has been closed.
Impact
The first problem can allow an attacker to overwrite
arbitrary local files when uncompressing a file using the -N
command line option.
The second problem can allow a local attacker to change the
permissions of arbitrary local files, on the same partition
as the one the user is uncompressing a file on, by removing
the file the user is uncompressing and replacing it with a
hardlink before the uncompress operation is finished.
Workaround
Do not use the -N command line option on untrusted files
and do not uncompress files in directories where untrusted
users have write access.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd= 5.4UNKNOWN
FreeBSDanynoarchfreebsd< 5.4_2UNKNOWN
FreeBSDanynoarchgzip< 1.3.5_2UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.5%