CVE-2005-0988

Current Description

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.

Basic Data

PublishedMay 02, 2005
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score3.7
SeverityLOW
Exploitability Score1.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnuGzip1.2.4*******
    2.3ApplicationGnuGzip1.2.4a*******
    2.3ApplicationGnuGzip1.3.3*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFreebsdFreebsd4.0*******
    2.3OSFreebsdFreebsd4.0alpha******
    2.3OSFreebsdFreebsd4.0releng******
    2.3OSFreebsdFreebsd4.1*******
    2.3OSFreebsdFreebsd4.1.1*******
    2.3OSFreebsdFreebsd4.1.1release******
    2.3OSFreebsdFreebsd4.1.1stable******
    2.3OSFreebsdFreebsd4.2*******
    2.3OSFreebsdFreebsd4.2stable******
    2.3OSFreebsdFreebsd4.3*******
    2.3OSFreebsdFreebsd4.3release******
    2.3OSFreebsdFreebsd4.3release_p38******
    2.3OSFreebsdFreebsd4.3releng******
    2.3OSFreebsdFreebsd4.3stable******
    2.3OSFreebsdFreebsd4.4*******
    2.3OSFreebsdFreebsd4.4release_p42******
    2.3OSFreebsdFreebsd4.4releng******
    2.3OSFreebsdFreebsd4.4stable******
    2.3OSFreebsdFreebsd4.5*******
    2.3OSFreebsdFreebsd4.5release******
    2.3OSFreebsdFreebsd4.5release_p32******
    2.3OSFreebsdFreebsd4.5releng******
    2.3OSFreebsdFreebsd4.5stable******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.6release******
    2.3OSFreebsdFreebsd4.6release_p20******
    2.3OSFreebsdFreebsd4.6releng******
    2.3OSFreebsdFreebsd4.6stable******
    2.3OSFreebsdFreebsd4.6.2*******
    2.3OSFreebsdFreebsd4.7*******
    2.3OSFreebsdFreebsd4.7release******
    2.3OSFreebsdFreebsd4.7release_p17******
    2.3OSFreebsdFreebsd4.7releng******
    2.3OSFreebsdFreebsd4.7stable******
    2.3OSFreebsdFreebsd4.8*******
    2.3OSFreebsdFreebsd4.8pre-release******
    2.3OSFreebsdFreebsd4.8release_p6******
    2.3OSFreebsdFreebsd4.8releng******
    2.3OSFreebsdFreebsd4.9*******
    2.3OSFreebsdFreebsd4.9pre-release******
    2.3OSFreebsdFreebsd4.9releng******
    2.3OSFreebsdFreebsd4.10*******
    2.3OSFreebsdFreebsd4.10release******
    2.3OSFreebsdFreebsd4.10release_p8******
    2.3OSFreebsdFreebsd4.10releng******
    2.3OSFreebsdFreebsd4.11release_p3******
    2.3OSFreebsdFreebsd4.11releng******
    2.3OSFreebsdFreebsd4.11stable******
    2.3OSFreebsdFreebsd5.0*******
    2.3OSFreebsdFreebsd5.0alpha******
    2.3OSFreebsdFreebsd5.0release_p14******
    2.3OSFreebsdFreebsd5.0releng******
    2.3OSFreebsdFreebsd5.1*******
    2.3OSFreebsdFreebsd5.1alpha******
    2.3OSFreebsdFreebsd5.1release******
    2.3OSFreebsdFreebsd5.1release_p5******
    2.3OSFreebsdFreebsd5.1releng******
    2.3OSFreebsdFreebsd5.2*******
    2.3OSFreebsdFreebsd5.2.1release******
    2.3OSFreebsdFreebsd5.2.1releng******
    2.3OSFreebsdFreebsd5.3*******
    2.3OSFreebsdFreebsd5.3release******
    2.3OSFreebsdFreebsd5.3releng******
    2.3OSFreebsdFreebsd5.3stable******
    2.3OSFreebsdFreebsd5.4pre-release******
    2.3OSFreebsdFreebsd5.4release******
    2.3OSFreebsdFreebsd5.4releng******
    2.3OSGentooLinux********
    2.3OSRedhatEnterprise Linux2.1*advanced_server*****
    2.3OSRedhatEnterprise Linux2.1*advanced_server_ia64*****
    2.3OSRedhatEnterprise Linux2.1*enterprise_server*****
    2.3OSRedhatEnterprise Linux2.1*enterprise_server_ia64*****
    2.3OSRedhatEnterprise Linux2.1*workstation*****
    2.3OSRedhatEnterprise Linux2.1*workstation_ia64*****
    2.3OSRedhatEnterprise Linux3.0*advanced_server*****
    2.3OSRedhatEnterprise Linux3.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux3.0*workstation_server*****
    2.3OSRedhatEnterprise Linux4.0*advanced_server*****
    2.3OSRedhatEnterprise Linux4.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux4.0*workstation*****
    2.3OSRedhatEnterprise Linux Desktop3.0*******
    2.3OSRedhatEnterprise Linux Desktop4.0*******
    2.3OSRedhatLinux Advanced Workstation2.1*ia64*****
    2.3OSRedhatLinux Advanced Workstation2.1*itanium_processor*****
    2.3OSTrustixSecure Linux2.0*******
    2.3OSTrustixSecure Linux2.1*******
    2.3OSTrustixSecure Linux2.2*******
    2.3OSTurbolinuxTurbolinux Appliance Server1.0_hosting*******
    2.3OSTurbolinuxTurbolinux Appliance Server1.0_workgroup*******
    2.3OSTurbolinuxTurbolinux Desktop10.0*******
    2.3OSTurbolinuxTurbolinux Home********
    2.3OSTurbolinuxTurbolinux Server7.0*******
    2.3OSTurbolinuxTurbolinux Server8.0*******
    2.3OSTurbolinuxTurbolinux Server10.0*******
    2.3OSTurbolinuxTurbolinux Workstation7.0*******
    2.3OSTurbolinuxTurbolinux Workstation8.0*******
    2.3OSUbuntuUbuntu Linux4.1*ia64*****
    2.3OSUbuntuUbuntu Linux4.1*ppc*****
    2.3OSUbuntuUbuntu Linux5.04*amd64*****
    2.3OSUbuntuUbuntu Linux5.04*i386*****
    2.3OSUbuntuUbuntu Linux5.04*powerpc*****

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 4.0, 4.1, 4.1.1, 4.10, 4.11, 4.2, 4.3, 4.4, 4.5, 4.6, 4.6.2, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.2.1, 5.3, 5.4
Redhat Enterprise Linux 2.1, 3.0, 4.0
Redhat Enterprise Linux Desktop 3.0, 4.0
Redhat Linux Advanced Workstation 2.1
Ubuntu Ubuntu Linux 4.1, 5.04
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux Server 10.0, 7.0, 8.0
Turbolinux Turbolinux Workstation 7.0, 8.0
Turbolinux Turbolinux Home *
Turbolinux Turbolinux Appliance Server 1.0_hosting, 1.0_workgroup
Gnu Gzip 1.2.4, 1.2.4a, 1.3.3
Trustix Secure Linux 2.0, 2.1, 2.2
Gentoo Linux *

References

NameSourceURLTags
SCOSA-2005.58ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txtSCO
APPLE-SA-2006-08-01http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.htmlAPPLE
RHSA-2005:357http://rhn.redhat.com/errata/RHSA-2005-357.htmlREDHAT
18100http://secunia.com/advisories/18100SECUNIA
21253http://secunia.com/advisories/21253SECUNIA
22033http://secunia.com/advisories/22033SECUNIA
SSA:2006-262http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852SLACKWARE
101816http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1SUNALERT
DSA-752http://www.debian.org/security/2005/dsa-752DEBIAN
15487http://www.osvdb.org/15487OSVDB
20050404 gzip TOCTOU file-permissions vulnerabilityhttp://www.securityfocus.com/archive/1/394965BUGTRAQVendor Advisory
12996http://www.securityfocus.com/bid/12996BIDPatch
19289http://www.securityfocus.com/bid/19289BID
TA06-214Ahttp://www.us-cert.gov/cas/techalerts/TA06-214A.htmlCERTUS Government Resource
ADV-2006-3101http://www.vupen.com/english/advisories/2006/3101VUPEN
oval:org.mitre.oval:def:10242https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242OVAL
oval:org.mitre.oval:def:1169https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169OVAL
oval:org.mitre.oval:def:765https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765OVAL