Synopsis
The remote CentOS host is missing one or more security updates.
Description
Updated bzip2 packages that fix multiple issues are now available.
This update has been rated as having low security impact by the Red Hat Security Response Team.
[Updated 13 February 2006] Replacement bzip2 packages for Red Hat Enterprise Linux 4 have been created as the original erratum packages did not fix CVE-2005-0758.
Bzip2 is a data compressor.
A bug was found in the way bzgrep processes file names. If a user can be tricked into running bzgrep on a file with a carefully crafted file name, arbitrary commands could be executed as the user running bzgrep.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0758 to this issue.
A bug was found in the way bzip2 modifies file permissions during decompression. If an attacker has write access to the directory into which bzip2 is decompressing files, it is possible for them to modify permissions on files owned by the user running bzip2 (CVE-2005-0953).
A bug was found in the way bzip2 decompresses files. It is possible for an attacker to create a specially crafted bzip2 file which will cause bzip2 to cause a denial of service (by filling disk space) if decompressed by a victim (CVE-2005-1260).
Users of Bzip2 should upgrade to these updated packages, which contain backported patches to correct these issues.
Solution
Update the affected bzip2 packages.
Plugin Details
File Name: centos_RHSA-2005-474.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Vulnerability Information
CPE: p-cpe:/a:centos:centos:bzip2, p-cpe:/a:centos:centos:bzip2-devel, p-cpe:/a:centos:centos:bzip2-libs, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 6/16/2005
Vulnerability Publication Date: 5/2/2005