Lucene search

K
ubuntuUbuntuUSN-159-1
HistoryAug 01, 2005 - 12:00 a.m.

unzip vulnerability

2005-08-0100:00:00
ubuntu.com
25

7.1 High

AI Score

Confidence

Low

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

8.9%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

If a ZIP archive contains binaries with the setuid and/or setgid bit
set, unzip preserved those bits when extracting the archive. This
could be exploited by tricking the administrator into unzipping an
archive with a setuid-root binary into a directory the attacker can
access. This allowed the attacker to execute arbitrary commands with
root privileges.

The updated version does not preserve setuid, setgid, and sticky bits
any more by default. The old behaviour can be explicitly requested now
by supplying the option ‘-K’.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchunzip< *UNKNOWN
Ubuntu4.10noarchunzip< *UNKNOWN

7.1 High

AI Score

Confidence

Low

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

8.9%