diff options
author | simon <simon@FreeBSD.org> | 2005-06-18 22:32:18 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2005-06-18 22:32:18 +0800 |
commit | 2ae97fe011f1f74c96f5e91644264c5f437b62a5 (patch) | |
tree | bd6caecbdeb3b4ad6bcab3fe418d302f7b78520d | |
parent | 773ea8c74d123b3600866efbdf5398fd5f89620c (diff) | |
download | freebsd-ports-gnome-2ae97fe011f1f74c96f5e91644264c5f437b62a5.tar.gz freebsd-ports-gnome-2ae97fe011f1f74c96f5e91644264c5f437b62a5.tar.zst freebsd-ports-gnome-2ae97fe011f1f74c96f5e91644264c5f437b62a5.zip |
Document FreeBSD-SA-05:11.gzip.
-rw-r--r-- | security/vuxml/vuln.xml | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0163afea380e..f2811b7033cd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,61 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="63bd4bad-dffe-11d9-b875-0001020eed82"> + <topic>gzip directory traversal and permission race vulnerabilities</topic> + <affects> + <system> + <name>FreeBSD</name> + <range><ge>5.4</ge><le>5.4_2</le></range> + <range><ge>5.0</ge><le>5.3_16</le></range> + <range><ge>4.11</ge><le>4.11_10</le></range> + <range><ge>4.10</ge><le>4.10_15</le></range> + <range><ge>4.9</ge><le>4.9_18</le></range> + <range><le>4.8_33</le></range> + </system> + <package> + <name>gzip</name> + <range><lt>1.3.5_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description</h1> + <p>Two problems related to extraction of files exist in gzip:</p> + <p>The first problem is that gzip does not properly sanitize + filenames containing "/" when uncompressing files using the + -N command line option.</p> + <p>The second problem is that gzip does not set permissions on + newly extracted files until after the file has been created + and the file descriptor has been closed.</p> + <h1>Impact</h1> + <p>The first problem can allow an attacker to overwrite + arbitrary local files when uncompressing a file using the -N + command line option.</p> + <p>The second problem can allow a local attacker to change the + permissions of arbitrary local files, on the same partition + as the one the user is uncompressing a file on, by removing + the file the user is uncompressing and replacing it with a + hardlink before the uncompress operation is finished.</p> + <h1>Workaround</h1> + <p>Do not use the -N command line option on untrusted files + and do not uncompress files in directories where untrusted + users have write access.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0988</cvename> + <cvename>CAN-2005-1228</cvename> + <freebsdsa>SA-05:11.gzip</freebsdsa> + <mlist msgid="7389fc4b05040412574f819112@mail.gmail.com">http://marc.theaimsgroup.com/?l=bugtraq&m=111271860708210</mlist> + <mlist msgid="7389fc4b0504201224759f31b@mail.gmail.com">http://marc.theaimsgroup.com/?l=bugtraq&m=111402732406477</mlist> + </references> + <dates> + <discovery>2005-04-20</discovery> + <entry>2005-06-18</entry> + </dates> + </vuln> + <vuln vid="9fae0f1f-df82-11d9-b875-0001020eed82"> <topic>tcpdump -- infinite loops in protocol decoding</topic> <affects> |