Vulnerabilidad en archivo bzlib.c en bzip2 (CVE-2008-1372)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
18/03/2008
Última modificación:
09/04/2025
Descripción
El archivo bzlib.c en bzip2 versiones anteriores a 1.0.5, permite a los atacantes remotos asistidos por el usuario causar una denegación de servicio (bloqueo) por medio de un archivo diseñado que activa una lectura excesiva del búfer, como es demostrado por el conjunto de pruebas PROTOS GENOME para Formatos de Archivo.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
- http://kb.vmware.com/kb/1006982
- http://kb.vmware.com/kb/1007198
- http://kb.vmware.com/kb/1007504
- http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
- http://secunia.com/advisories/29410
- http://secunia.com/advisories/29475
- http://secunia.com/advisories/29497
- http://secunia.com/advisories/29506
- http://secunia.com/advisories/29656
- http://secunia.com/advisories/29677
- http://secunia.com/advisories/29698
- http://secunia.com/advisories/29940
- http://secunia.com/advisories/31204
- http://secunia.com/advisories/31869
- http://secunia.com/advisories/31878
- http://secunia.com/advisories/36096
- http://security.gentoo.org/glsa/glsa-200903-40.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-241786-1
- http://support.apple.com/kb/HT3757
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0118
- http://www.bzip.org/CHANGES
- http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
- http://www.gentoo.org/security/en/glsa/glsa-200804-02.xml
- http://www.ipcop.org/index.php?name=News&file=article&sid=40
- http://www.kb.cert.org/vuls/id/813451
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A075
- http://www.redhat.com/support/errata/RHSA-2008-0893.html
- http://www.securityfocus.com/archive/1/489968/100/0/threaded
- http://www.securityfocus.com/archive/1/498863/100/0/threaded
- http://www.securityfocus.com/bid/28286
- http://www.securitytracker.com/id?1020867=
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473263
- http://www.us-cert.gov/cas/techalerts/TA09-218A.html
- http://www.vupen.com/english/advisories/2008/0915
- http://www.vupen.com/english/advisories/2008/2557
- http://www.vupen.com/english/advisories/2009/2172
- https://bugs.gentoo.org/attachment.cgi?id=146488&action=view
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41249
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467
- https://usn.ubuntu.com/590-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00165.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00225.html
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
- http://kb.vmware.com/kb/1006982
- http://kb.vmware.com/kb/1007198
- http://kb.vmware.com/kb/1007504
- http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
- http://secunia.com/advisories/29410
- http://secunia.com/advisories/29475
- http://secunia.com/advisories/29497
- http://secunia.com/advisories/29506
- http://secunia.com/advisories/29656
- http://secunia.com/advisories/29677
- http://secunia.com/advisories/29698
- http://secunia.com/advisories/29940
- http://secunia.com/advisories/31204
- http://secunia.com/advisories/31869
- http://secunia.com/advisories/31878
- http://secunia.com/advisories/36096
- http://security.gentoo.org/glsa/glsa-200903-40.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-241786-1
- http://support.apple.com/kb/HT3757
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0118
- http://www.bzip.org/CHANGES
- http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
- http://www.gentoo.org/security/en/glsa/glsa-200804-02.xml
- http://www.ipcop.org/index.php?name=News&file=article&sid=40
- http://www.kb.cert.org/vuls/id/813451
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A075
- http://www.redhat.com/support/errata/RHSA-2008-0893.html
- http://www.securityfocus.com/archive/1/489968/100/0/threaded
- http://www.securityfocus.com/archive/1/498863/100/0/threaded
- http://www.securityfocus.com/bid/28286
- http://www.securitytracker.com/id?1020867=
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473263
- http://www.us-cert.gov/cas/techalerts/TA09-218A.html
- http://www.vupen.com/english/advisories/2008/0915
- http://www.vupen.com/english/advisories/2008/2557
- http://www.vupen.com/english/advisories/2009/2172
- https://bugs.gentoo.org/attachment.cgi?id=146488&action=view
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41249
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467
- https://usn.ubuntu.com/590-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00165.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00225.html



