Boletines de Vulnerabilidades |
Denegación de servicio en bzip2 |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | bzip2 |
Descripción |
|
Se ha descubierto una vulnerabilidad en bzip2. La vulnerabilidad reside en el proceso de descompresión de archivos bzip2. Bajo determinadas circunstancias éste puede entrar en un bucle infinito, lo que podría resultar en un archivo de salida de tamaño indefinido que consuma todo el espacio disponible en disco. La explotación de esta vulnerabilidad podría permitir a un atacante local provocar una situación de denegación del sistema mediante un archivo bzip2 especialmente diseñado. |
|
Solución |
|
Actualización de software Mandriva Linux Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/bzip2-1.0.2-17.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libbzip2_1-1.0.2-17.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/libbzip2_1-devel-1.0.2-17.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/bzip2-1.0.2-17.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/bzip2-1.0.2-17.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64bzip2_1-1.0.2-17.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/lib64bzip2_1-devel-1.0.2-17.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/bzip2-1.0.2-17.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/bzip2-1.0.2-20.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libbzip2_1-1.0.2-20.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/libbzip2_1-devel-1.0.2-20.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/bzip2-1.0.2-20.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/bzip2-1.0.2-20.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64bzip2_1-1.0.2-20.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/lib64bzip2_1-devel-1.0.2-20.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/bzip2-1.0.2-20.1.101mdk.src.rpm Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/bzip2-1.0.2-10.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/libbzip2_1-1.0.2-10.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/bzip2-1.0.2-10.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/bzip2-1.0.2-10.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/libbzip2_1-1.0.2-10.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/libbzip2_1-devel-1.0.2-10.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/bzip2-1.0.2-10.1.C21mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/bzip2-1.0.2-17.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libbzip2_1-1.0.2-17.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/libbzip2_1-devel-1.0.2-17.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/bzip2-1.0.2-17.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/bzip2-1.0.2-17.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64bzip2_1-1.0.2-17.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/lib64bzip2_1-devel-1.0.2-17.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/bzip2-1.0.2-17.1.C30mdk.src.rpm Mandrivalinux LE2005 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/bzip2-1.0.2-20.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/libbzip2_1-1.0.2-20.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/libbzip2_1-devel-1.0.2-20.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/bzip2-1.0.2-20.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/bzip2-1.0.2-20.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/lib64bzip2_1-1.0.2-20.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/lib64bzip2_1-devel-1.0.2-20.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/bzip2-1.0.2-20.1.102mdk.src.rpm SUSE Linux Actualizar mediante YaST Online Update Red Hat Linux (bzip2) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ FreeBSD FreeBSD 4.10 FreeBSD 4.11 FreeBSD 5.3 FreeBSD 5.4 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:14/bzip2.patch Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5.dsc http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5.diff.gz http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_alpha.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_alpha.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_alpha.deb ARM http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_arm.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_arm.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_i386.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_i386.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_ia64.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_ia64.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_ia64.deb HP Precision http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_hppa.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_hppa.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_m68k.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_m68k.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_mips.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_mips.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_mipsel.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_mipsel.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_powerpc.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_powerpc.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_s390.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_s390.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/b/bzip2/bzip2_1.0.2-1.woody5_sparc.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-1.0_1.0.2-1.woody5_sparc.deb http://security.debian.org/pool/updates/main/b/bzip2/libbz2-dev_1.0.2-1.woody5_sparc.deb SGI Advanced Linux Environment 3 / RPM / Patch 10279 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10279 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-1260 |
BID | |
Recursos adicionales |
|
Mandriva Security Advisories MDKSA-2005:091 http://www.mandriva.com/security/advisories?name=MDKSA-2005:091 SUSE Security Summary Report SUSE-SR:2005:015 http://www.novell.com/linux/security/advisories/2005_15_sr.html Red Hat Security Advisory (RHSA-2005:474-21) https://rhn.redhat.com/errata/RHSA-2005-474.html FreeBSD Security Advisory FreeBSD-SA-05:14.bzip2 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:14.bzip2.asc Debian Security Advisory DSA 741-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00126.html SGI Security Advisory (20060301-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2005-05-19 |
1.1 | Aviso emitido por SUSE (SUSE-SR:2005:015) | 2005-06-14 |
1.2 | Aviso emitido por Red Hat (RHSA-2005:474-15) | 2005-06-17 |
1.3 | Aviso emitido por FreeBSD (FreeBSD-SA-05:14.bzip2) | 2005-06-30 |
1.4 | Aviso emitido por Debian (DSA 741-1) | 2005-07-08 |
1.5 | Aviso emitido por Red Hat (RHSA-2005:474-21) | 2006-02-14 |
1.6 | Aviso emitido por SGI (20060301-01-U) | 2006-03-10 |