Lucene search

K
gentooGentoo FoundationGLSA-200505-05
HistoryMay 09, 2005 - 12:00 a.m.

gzip: Multiple vulnerabilities

2005-05-0900:00:00
Gentoo Foundation
security.gentoo.org
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.5%

Background

gzip (GNU zip) is a popular compression program. The included zgrep utility allows you to grep gzipped files in place.

Description

The gzip and gunzip programs are vulnerable to a race condition when setting file permissions (CAN-2005-0988), as well as improper handling of filename restoration (CAN-2005-1228). The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).

Impact

These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.

Workaround

There is no known workaround at this time.

Resolution

All gzip users should upgrade to the latest stable version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/gzip< 1.3.5-r6UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.5%