English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 74154 CVE descriptions
and 39337 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.52669
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-116-1 (gzip)
Summary:Ubuntu USN-116-1 (gzip)
Description:
The remote host is missing an update to gzip
announced via advisory USN-116-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: gzip

Details follow:

Imran Ghory discovered a race condition in the file permission restore
code of gzip and gunzip. While a user was compressing or decompressing
a file, a local attacker with write permissions in the directory of
that file could replace the target file with a hard link. This would
cause gzip to restore the file permissions to the hard link target
instead of to the gzip output file, which could be exploited to gain
read or even write access to files of other users. (CVE-2005-0988)

Ulf Harnhammar found a path traversal vulnerability when gunzip was
used with the -N option. An attacker could exploit this to create
files in an arbitrary directory with the permissions of a user if he
tricked this user to decompress a specially crafted gzip file using
the -N option (which can also happen in systems that automatically
process uploaded gzip files). (CVE-2005-1228)

Solution:
The problem can be corrected by upgrading the affected package to
version 1.3.5-9ubuntu3.1 (for Ubuntu 4.10), or 1.3.5-9ubuntu3.2 (for
Ubuntu 5.04). In general, a standard system upgrade is sufficient to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-116-1

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0988
Bugtraq: 20050404 gzip TOCTOU file-permissions vulnerability (Google Search)
http://www.securityfocus.com/archive/1/394965
http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
Debian Security Information: DSA-752 (Google Search)
http://www.debian.org/security/2005/dsa-752
RedHat Security Advisories: RHSA-2005:357
http://rhn.redhat.com/errata/RHSA-2005-357.html
SCO Security Bulletin: SCOSA-2005.58
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
Cert/CC Advisory: TA06-214A
http://www.us-cert.gov/cas/techalerts/TA06-214A.html
BugTraq ID: 12996
http://www.securityfocus.com/bid/12996
BugTraq ID: 19289
http://www.securityfocus.com/bid/19289
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10242
http://www.vupen.com/english/advisories/2006/3101
http://www.osvdb.org/15487
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1169
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:765
http://secunia.com/advisories/18100
http://secunia.com/advisories/21253
http://secunia.com/advisories/22033
Common Vulnerability Exposure (CVE) ID: CVE-2005-1228
Bugtraq: 20050420 gzip directory traversal vulnerability (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=111402732406477&w=2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11057
http://www.osvdb.org/15721
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:382
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:170
http://secunia.com/advisories/15047
XForce ISS Database: gzip-n-directory-traversal(20199)
http://xforce.iss.net/xforce/xfdb/20199
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39337 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.