ID CVE-2010-0405
Summary Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
References
Vulnerable Configurations
  • cpe:2.3:a:bzip:bzip2:0.9
    cpe:2.3:a:bzip:bzip2:0.9
  • cpe:2.3:a:bzip:bzip2:0.9.0
    cpe:2.3:a:bzip:bzip2:0.9.0
  • cpe:2.3:a:bzip:bzip2:0.9.0a
    cpe:2.3:a:bzip:bzip2:0.9.0a
  • cpe:2.3:a:bzip:bzip2:0.9.0b
    cpe:2.3:a:bzip:bzip2:0.9.0b
  • cpe:2.3:a:bzip:bzip2:0.9.0c
    cpe:2.3:a:bzip:bzip2:0.9.0c
  • cpe:2.3:a:bzip:bzip2:0.9.5_a
    cpe:2.3:a:bzip:bzip2:0.9.5_a
  • cpe:2.3:a:bzip:bzip2:0.9.5_b
    cpe:2.3:a:bzip:bzip2:0.9.5_b
  • cpe:2.3:a:bzip:bzip2:0.9.5_c
    cpe:2.3:a:bzip:bzip2:0.9.5_c
  • cpe:2.3:a:bzip:bzip2:0.9.5_d
    cpe:2.3:a:bzip:bzip2:0.9.5_d
  • cpe:2.3:a:bzip:bzip2:0.9.5a
    cpe:2.3:a:bzip:bzip2:0.9.5a
  • cpe:2.3:a:bzip:bzip2:0.9.5b
    cpe:2.3:a:bzip:bzip2:0.9.5b
  • cpe:2.3:a:bzip:bzip2:0.9.5c
    cpe:2.3:a:bzip:bzip2:0.9.5c
  • cpe:2.3:a:bzip:bzip2:0.9.5d
    cpe:2.3:a:bzip:bzip2:0.9.5d
  • cpe:2.3:a:bzip:bzip2:0.9_a
    cpe:2.3:a:bzip:bzip2:0.9_a
  • cpe:2.3:a:bzip:bzip2:0.9_b
    cpe:2.3:a:bzip:bzip2:0.9_b
  • cpe:2.3:a:bzip:bzip2:0.9_c
    cpe:2.3:a:bzip:bzip2:0.9_c
  • cpe:2.3:a:bzip:bzip2:1.0
    cpe:2.3:a:bzip:bzip2:1.0
  • cpe:2.3:a:bzip:bzip2:1.0.1
    cpe:2.3:a:bzip:bzip2:1.0.1
  • cpe:2.3:a:bzip:bzip2:1.0.2
    cpe:2.3:a:bzip:bzip2:1.0.2
  • bzip bzip2 1.0.3
    cpe:2.3:a:bzip:bzip2:1.0.3
  • bzip bzip2 1.0.4
    cpe:2.3:a:bzip:bzip2:1.0.4
  • bzip bzip2 1.0.5
    cpe:2.3:a:bzip:bzip2:1.0.5
  • cpe:2.3:a:libzip2:libzip2:1.0.5
    cpe:2.3:a:libzip2:libzip2:1.0.5
CVSS
Base: 5.1 (as of 29-09-2010 - 16:21)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_6_7.NASL
    description The remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.7. Mac OS X 10.6.7 contains security fixes for the following products : - AirPort - Apache - AppleScript - ATS - bzip2 - CarbonCore - ClamAV - CoreText - File Quarantine - HFS - ImageIO - Image RAW - Installer - Kerberos - Kernel - Libinfo - libxml - Mailman - PHP - QuickLook - QuickTime - Ruby - Samba - Subversion - Terminal - X11
    last seen 2019-02-21
    modified 2018-08-22
    plugin id 52754
    published 2011-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52754
    title Mac OS X 10.6.x < 10.6.7 Multiple Vulnerabilities
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0019.NASL
    description a. Service Console update for samba The service console package samba is updated to version 3.0.9-1.3E.18. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-3069 to this issue. b. Service Console update for bzip2 The service console package bzip2 is updated to version 1.0.2-14.EL3 in ESX 3.x and version 1.0.3-6 in ESX 4.x. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0405 to this issue. c. Service Console update for OpenSSL The service console package openssl updated to version 0.9.7a-33.26. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-0590, CVE-2009-2409 and CVE-2009-3555 to the issues addressed in this update.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 51077
    published 2010-12-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=51077
    title VMSA-2010-0019 : VMware ESX third-party updates for Service Console
  • NASL family Misc.
    NASL id VMWARE_ESXI_5_0_BUILD_608089_REMOTE.NASL
    description The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities : - A denial of service vulnerability exists in the big2_toUtf8() function in file lib/xmltok.c in the libexpat library. A remote attacker can exploit this, via an XML document having malformed UTF-8 sequences, to cause a buffer over-read, thus crashing the application. (CVE-2009-3560) - A denial of service vulnerability exists in the updatePosition() function in file lib/xmltok.c in the libexpat library. A remote attacker can exploit this, via an XML document having malformed UTF-8 sequences, to cause a buffer over-read, thus crashing the application. (CVE-2009-3720) - An integer overflow condition exists in the BZ2_decompress() function in file decompress.c in the bzip2 and libbzip2 library. A remote attacker can exploit this, via a crafted compressed file, to cause a denial of service or the execution of arbitrary code. (CVE-2010-0405) - A denial of service vulnerability exists in the audioop module due to multiple integer overflows conditions in file audioop.c. A remote attacker can exploit this, via a large fragment or argument, to cause a buffer overflow, resulting in an application crash. (CVE-2010-1634) - A denial of service vulnerability exists in the audioop module due to a failure to verify the relationships between size arguments and byte string length. A remote attacker can exploit this, via crafted arguments, to cause memory corruption, resulting in an application crash. (CVE-2010-2089) - A flaw exists in the urllib and urllib2 modules due to processing Location headers that specify redirection to a file. A remote attacker can exploit this, via a crafted URL, to gain sensitive information or cause a denial of service. (CVE-2011-1521) - A privilege escalation vulnerability exists due to an incorrect ACL being used for the VMware Tools folder. An attacker on an adjacent network with access to a guest operating system can exploit this to gain elevated privileges on the guest operating system. (CVE-2012-1518)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 70881
    published 2013-11-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70881
    title ESXi 5.0 < Build 608089 Multiple Vulnerabilities (remote check)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2010-0019_REMOTE.NASL
    description The remote VMware ESX host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party components and libraries : - bzip2 - Network Security Services (NSS) Library - OpenSSL - Samba
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 89745
    published 2016-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89745
    title VMware ESX Multiple Vulnerabilities (VMSA-2010-0019) (remote check)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2011-001.NASL
    description The remote host is running a version of Mac OS X 10.5 that does not have Security Update 2011-001 applied. This security update contains fixes for the following products : - Apache - bzip2 - ClamAV - ImageIO - Kerberos - Libinfo - libxml - Mailman - PHP - QuickLook - Ruby - X11
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 52753
    published 2011-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52753
    title Mac OS X Multiple Vulnerabilities (Security Update 2011-001)
  • NASL family Misc.
    NASL id CLAMAV_0_96_3.NASL
    description According to its version, the clamd antivirus daemon on the remote host is earlier than 0.96.3. Such versions are reportedly affected by multiple vulnerabilities : - There is a failure to properly parse a specially crafted PDF file because of insufficient bounds-checks on PDF files in the 'find_stream_bounds()' function of the libclamav 'pdf.c' source file. (Bug 2226) - An integer overflow can be triggered in the 'BZ2_decompress' function when parsing specially crafted BZ2 files, which could cause the server to crash or potentially allow execution of arbitrary code. (Bugs 2230, 2231)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 49712
    published 2010-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49712
    title ClamAV < 0.96.3 Multiple Vulnerabilities
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-20.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-20 (Clam AntiVirus: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Clam AntiVirus. Please review the CVE identifiers referenced below for details. Impact : An unauthenticated remote attacker may execute arbitrary code with the privileges of the Clam AntiVirus process or cause a Denial of Service by causing an affected user or system to scan a crafted file. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56595
    published 2011-10-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56595
    title GLSA-201110-20 : Clam AntiVirus: Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2010-0858.NASL
    description Updated bzip2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. bzip2 is a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 50630
    published 2010-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50630
    title RHEL 6 : bzip2 (RHSA-2010:0858)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_BZIP2-100921.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This can be exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49755
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49755
    title openSUSE Security Update : bzip2 (openSUSE-SU-2010:0684-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-17439.NASL
    description ---------------------------------------------------------------------- ---------- ChangeLog : - Sun Oct 31 2010 Enrico Scholz - 0.96.4-1300 - updated to 0.96.4 - execute 'make check' (#640347) but ignore errors for now because four checks are failing on f13 - Wed Sep 29 2010 Enrico Scholz - lowered stop priority of sysv initscripts (#629435) - Wed Sep 22 2010 Enrico Scholz - 0.96.3-1300 - updated to 0.96.3 - fixes CVE-2010-0405 in shipped bzlib.c copy - Sun Aug 15 2010 Enrico Scholz - 0.96.2-1300 - updated to 0.96.2 - rediffed patches - removed the -jit-disable patch which is replaced upstream by a more detailed configuration option. - Wed Aug 11 2010 Enrico Scholz - use 'groupmems', not 'usermod' to add a user to a group because 'usermod' does not work when user does not exist in local /etc/passwd - Tue Jun 1 2010 Enrico Scholz - 0.96.1-1400 - updated to 0.96.1 - applied upstream patch which allows to disable JIT compiler (#573191) - disabled JIT compiler by default - removed explicit 'pkgconfig' requirements in -devel (#533956) - added some BRs - rediffed patches Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-13
    plugin id 50683
    published 2010-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50683
    title Fedora 13 : clamav-0.96.4-1300.fc13 (2010-17439)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-986-1.NASL
    description An integer overflow was discovered in bzip2. If a user or automated system were tricked into decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to crash or possibly execute code as the user running the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49303
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49303
    title Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : bzip2 vulnerability (USN-986-1)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_126868-04.NASL
    description SunOS 5.10: SunFreeware bzip2 patch. Date this patch was last updated by Sun : Nov/15/10
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107457
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107457
    title Solaris 10 (sparc) : 126868-04
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12645.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This could have been exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2016-05-24
    plugin id 49760
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49760
    title SuSE9 Security Update : bzip2 (YOU Patch Number 12645)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2010-0703.NASL
    description Updated bzip2 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. bzip2 is a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49633
    published 2010-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49633
    title CentOS 3 / 4 / 5 : bzip2 (CESA-2010:0703)
  • NASL family Misc.
    NASL id VMWARE_VMSA-2012-0005_REMOTE.NASL
    description The remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in the following components : - Apache Tomcat - bzip2 library - JRE - WDDM display driver - XPDM display driver
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 89106
    published 2016-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89106
    title VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0005) (BEAST) (remote check)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-986-3.NASL
    description USN-986-1 fixed vulnerabilities in bzip2. dpkg statically links against libbz2 and needed to be rebuilt to use the updated libbz2. An integer overflow was discovered in bzip2. If a user or automated system were tricked into decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to crash or possibly execute code as the user running the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49305
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49305
    title Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : dpkg vulnerability (USN-986-3)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-15125.NASL
    description - Wed Sep 22 2010 Ivana Hutarova Varekova - 1.0.6-1 - update to 1.0.6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-12
    plugin id 50697
    published 2010-11-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50697
    title Fedora 12 : bzip2-1.0.6-1.fc12 (2010-15125)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2010-185.NASL
    description An integer overflow has been found and corrected in bzip2 which could be exploited by using a specially crafted bz2 file and cause a denial of service attack (CVE-2010-0405). Additionally clamav has been upgraded to 0.96.2 and has been patched for this issue. perl-Compress-Bzip2 in MES5 has been linked against the system bzip2 library to resolv this issue. Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 49300
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49300
    title Mandriva Linux Security Advisory : bzip2 (MDVSA-2010:185)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_BZIP2-7169.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This can be exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2016-08-16
    plugin id 49832
    published 2010-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49832
    title SuSE 10 Security Update : bzip2 (ZYPP Patch Number 7169)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-15443.NASL
    description - Bug #627882 - CVE-2010-0405 bzip2: integer overflow flaw in BZ2_decompress Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-12
    plugin id 49769
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49769
    title Fedora 14 : clamav-0.96.3-1400.fc14 (2010-15443)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-986-2.NASL
    description USN-986-1 fixed a vulnerability in bzip2. This update provides the corresponding update for ClamAV. An integer overflow was discovered in bzip2. If a user or automated system were tricked into decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to crash or possibly execute code as the user running the program. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49304
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49304
    title Ubuntu 9.04 / 9.10 / 10.04 LTS : clamav vulnerability (USN-986-2)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2112.NASL
    description Mikolaj Izdebski has discovered an integer overflow flaw in the BZ2_decompress function in bzip2/libbz2. An attacker could use a crafted bz2 file to cause a denial of service (application crash) or potentially to execute arbitrary code. (CVE-2010-0405 )
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49291
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49291
    title Debian DSA-2112-1 : bzip2 - integer overflow
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_BZIP2-100921.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This can be exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49753
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49753
    title openSUSE Security Update : bzip2 (openSUSE-SU-2010:0684-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_BZIP2-100921.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This can be exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75443
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75443
    title openSUSE Security Update : bzip2 (openSUSE-SU-2010:0684-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2010-0858.NASL
    description From Red Hat Security Advisory 2010:0858 : Updated bzip2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. bzip2 is a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68136
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68136
    title Oracle Linux 6 : bzip2 (ELSA-2010-0858)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-15120.NASL
    description - Wed Sep 22 2010 Ivana Hutarova Varekova - 1.0.6-1 - update to 1.0.6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-13
    plugin id 49685
    published 2010-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49685
    title Fedora 13 : bzip2-1.0.6-1.fc13 (2010-15120)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_0DDB57A9DA204E99B0484366092F3D31.NASL
    description Secunia reports : A vulnerability has been reported in bzip2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. The vulnerability is caused due to an integer overflow in the 'BZ2_decompress()' function in decompress.c and can be exploited to cause a crash or potentially execute arbitrary code.
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 50328
    published 2010-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50328
    title FreeBSD : bzip2 -- integer overflow vulnerability (0ddb57a9-da20-4e99-b048-4366092f3d31)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201301-05.NASL
    description The remote host is affected by the vulnerability described in GLSA-201301-05 (bzip2: User-assisted execution of arbitrary code) An integer overflow vulnerability has been discovered in bzip2. Please review the CVE identifier referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted compressed file using bzip2, possibly resulting in execution of arbitrary code with the privileges of the process, or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 63439
    published 2013-01-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63439
    title GLSA-201301-05 : bzip2: User-assisted execution of arbitrary code
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20101110_BZIP2_ON_SL6_X.NASL
    description An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60887
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60887
    title Scientific Linux Security Update : bzip2 on SL6.x i386/x86_64
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_126869-05.NASL
    description SunOS 5.10_x86: SunFreeware bzip2 patch. Date this patch was last updated by Sun : Nov/15/10
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107958
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107958
    title Solaris 10 (x86) : 126869-05
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2010-0703.NASL
    description Updated bzip2 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. bzip2 is a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49301
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49301
    title RHEL 3 / 4 / 5 : bzip2 (RHSA-2010:0703)
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2012-0005.NASL
    description a. VMware Tools Display Driver Privilege Escalation The VMware XPDM and WDDM display drivers contain buffer overflow vulnerabilities and the XPDM display driver does not properly check for NULL pointers. Exploitation of these issues may lead to local privilege escalation on Windows-based Guest Operating Systems. VMware would like to thank Tarjei Mandt for reporting theses issues to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2012-1509 (XPDM buffer overrun), CVE-2012-1510 (WDDM buffer overrun) and CVE-2012-1508 (XPDM null pointer dereference) to these issues. Note: CVE-2012-1509 doesn't affect ESXi and ESX. b. vSphere Client internal browser input validation vulnerability The vSphere Client has an internal browser that renders html pages from log file entries. This browser doesn't properly sanitize input and may run script that is introduced into the log files. In order for the script to run, the user would need to open an individual, malicious log file entry. The script would run with the permissions of the user that runs the vSphere Client. VMware would like to thank Edward Torkington for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-1512 to this issue. In order to remediate the issue, the vSphere Client of the vSphere 5.0 Update 1 release or the vSphere 4.1 Update 2 release needs to be installed. The vSphere Clients that come with vSphere 4.0 and vCenter Server 2.5 are not affected. c. vCenter Orchestrator Password Disclosure The vCenter Orchestrator (vCO) Web Configuration tool reflects back the vCenter Server password as part of the webpage. This might allow the logged-in vCO administrator to retrieve the vCenter Server password. VMware would like to thank Alexey Sintsov from Digital Security Research Group for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-1513 to this issue. d. vShield Manager Cross-Site Request Forgery vulnerability The vShield Manager (vSM) interface has a Cross-Site Request Forgery vulnerability. If an attacker can convince an authenticated user to visit a malicious link, the attacker may force the victim to forward an authenticated request to the server. VMware would like to thank Frans Pehrson of Xxor AB (www.xxor.se) and Claudio Criscione for independently reporting this issue to us The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-1514 to this issue. e. vCenter Update Manager, Oracle (Sun) JRE update 1.6.0_30 Oracle (Sun) JRE is updated to version 1.6.0_30, which addresses multiple security issues that existed in earlier releases of Oracle (Sun) JRE. Oracle has documented the CVE identifiers that are addressed in JRE 1.6.0_29 and JRE 1.6.0_30 in the Oracle Java SE Critical Patch Update Advisory of October 2011. The References section provides a link to this advisory. f. vCenter Server Apache Tomcat update 6.0.35 Apache Tomcat has been updated to version 6.0.35 to address multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-3190, CVE-2011-3375, CVE-2011-4858, and CVE-2012-0022 to these issues. g. ESXi update to third-party component bzip2 The bzip2 library is updated to version 1.0.6, which resolves a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0405 to this issue.
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 58362
    published 2012-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58362
    title VMSA-2012-0005 : VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi, and ESX address several security issues
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL15878.NASL
    description Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 79587
    published 2014-11-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79587
    title F5 Networks BIG-IP : bzip2 vulnerability (SOL15878)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_BZIP2-100916.NASL
    description This update fixes an integer overflow in the BZ2_decompress function of bzip2/libbz2. This could have been exploited via a crafted archive to cause a denial of service or even execute arbitrary code. (CVE-2010-0405)
    last seen 2019-02-21
    modified 2013-10-26
    plugin id 50893
    published 2010-12-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50893
    title SuSE 11 / 11.1 Security Update : bzip2 (SAT Patch Numbers 3121 / 3125)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2010-0703.NASL
    description From Red Hat Security Advisory 2010:0703 : Updated bzip2 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. bzip2 is a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) Users of bzip2 should upgrade to these updated packages, which contain a backported patch to resolve this issue. All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68102
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68102
    title Oracle Linux 3 / 4 / 5 : bzip2 (ELSA-2010-0703)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2010-263-01.NASL
    description New bzip2 packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 49290
    published 2010-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49290
    title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / 8.1 / 9.0 / 9.1 / current : bzip2 (SSA:2010-263-01)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-15106.NASL
    description - Bug #627882 - CVE-2010-0405 bzip2: integer overflow flaw in BZ2_decompress Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-12
    plugin id 49684
    published 2010-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49684
    title Fedora 14 : bzip2-1.0.6-1.fc14 (2010-15106)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20100920_BZIP2_ON_SL3_X__SL4_X__SL5_X.NASL
    description An integer overflow flaw was discovered in the bzip2 decompression routine. This issue could, when decompressing malformed archives, cause bzip2, or an application linked against the libbz2 library, to crash or, potentially, execute arbitrary code. (CVE-2010-0405) All running applications using the libbz2 library must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60858
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60858
    title Scientific Linux Security Update : bzip2 on SL3.x, SL4.x, SL5.x i386/x86_64
redhat via4
advisories
  • bugzilla
    id 627882
    title CVE-2010-0405 bzip2: integer overflow flaw in BZ2_decompress
    oval
    OR
    • AND
      • comment Red Hat Enterprise Linux 3 is installed
        oval oval:com.redhat.rhsa:tst:20060015001
      • OR
        • AND
          • comment bzip2 is earlier than 0:1.0.2-14.EL3
            oval oval:com.redhat.rhsa:tst:20100703002
          • comment bzip2 is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893003
        • AND
          • comment bzip2-devel is earlier than 0:1.0.2-14.EL3
            oval oval:com.redhat.rhsa:tst:20100703006
          • comment bzip2-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893007
        • AND
          • comment bzip2-libs is earlier than 0:1.0.2-14.EL3
            oval oval:com.redhat.rhsa:tst:20100703004
          • comment bzip2-libs is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893005
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhsa:tst:20060016001
      • OR
        • AND
          • comment bzip2 is earlier than 0:1.0.2-16.el4_8
            oval oval:com.redhat.rhsa:tst:20100703009
          • comment bzip2 is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893003
        • AND
          • comment bzip2-devel is earlier than 0:1.0.2-16.el4_8
            oval oval:com.redhat.rhsa:tst:20100703010
          • comment bzip2-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893007
        • AND
          • comment bzip2-libs is earlier than 0:1.0.2-16.el4_8
            oval oval:com.redhat.rhsa:tst:20100703011
          • comment bzip2-libs is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20080893005
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • OR
        • AND
          • comment bzip2 is earlier than 0:1.0.3-6.el5_5
            oval oval:com.redhat.rhsa:tst:20100703013
          • comment bzip2 is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080893014
        • AND
          • comment bzip2-devel is earlier than 0:1.0.3-6.el5_5
            oval oval:com.redhat.rhsa:tst:20100703015
          • comment bzip2-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080893016
        • AND
          • comment bzip2-libs is earlier than 0:1.0.3-6.el5_5
            oval oval:com.redhat.rhsa:tst:20100703017
          • comment bzip2-libs is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20080893018
    rhsa
    id RHSA-2010:0703
    released 2010-09-20
    severity Important
    title RHSA-2010:0703: bzip2 security update (Important)
  • bugzilla
    id 627882
    title CVE-2010-0405 bzip2: integer overflow flaw in BZ2_decompress
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment bzip2 is earlier than 0:1.0.5-7.el6_0
          oval oval:com.redhat.rhsa:tst:20100858005
        • comment bzip2 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100858006
      • AND
        • comment bzip2-devel is earlier than 0:1.0.5-7.el6_0
          oval oval:com.redhat.rhsa:tst:20100858007
        • comment bzip2-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100858008
      • AND
        • comment bzip2-libs is earlier than 0:1.0.5-7.el6_0
          oval oval:com.redhat.rhsa:tst:20100858009
        • comment bzip2-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100858010
    rhsa
    id RHSA-2010:0858
    released 2010-11-10
    severity Important
    title RHSA-2010:0858: bzip2 security update (Important)
rpms
  • bzip2-0:1.0.2-14.EL3
  • bzip2-devel-0:1.0.2-14.EL3
  • bzip2-libs-0:1.0.2-14.EL3
  • bzip2-0:1.0.2-16.el4_8
  • bzip2-devel-0:1.0.2-16.el4_8
  • bzip2-libs-0:1.0.2-16.el4_8
  • bzip2-0:1.0.3-6.el5_5
  • bzip2-devel-0:1.0.3-6.el5_5
  • bzip2-libs-0:1.0.3-6.el5_5
  • bzip2-0:1.0.5-7.el6_0
  • bzip2-devel-0:1.0.5-7.el6_0
  • bzip2-libs-0:1.0.5-7.el6_0
refmap via4
apple APPLE-SA-2011-03-21-1
bugtraq 20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console
confirm
fedora
  • FEDORA-2010-1512
  • FEDORA-2010-17439
gentoo GLSA-201301-05
mlist [oss-security] 20100921 bzip2 CVE-2010-0405 integer overflow
secunia
  • 41452
  • 41505
  • 42350
  • 42404
  • 42405
  • 42529
  • 42530
  • 48378
suse SUSE-SR:2010:018
ubuntu
  • USN-986-1
  • USN-986-2
  • USN-986-3
vupen
  • ADV-2010-2455
  • ADV-2010-3043
  • ADV-2010-3052
  • ADV-2010-3073
  • ADV-2010-3126
  • ADV-2010-3127
vmware via4
description The bzip2 library is updated to version 1.0.6which resolves a security issue. -
id VMSA-2012-0005
last_updated 2012-12-20T00:00:00
published 2012-03-15T00:00:00
title ESXi update to third party component bzip2
Last major update 21-08-2013 - 23:28
Published 28-09-2010 - 14:00
Last modified 10-10-2018 - 15:52
Back to Top