First published: Mon Aug 12 2002(Updated: )
bzip2 before 1.0.2 in FreeBSD 4.5 and earlier, OpenLinux 3.1 and 3.1.1, and possibly other operating systems, does not use the O_EXCL flag to create files during decompression and does not warn the user if an existing file would be overwritten, which could allow attackers to overwrite files via a bzip2 archive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bzip2 | =1.0 | |
Bzip2 | =0.9.5d | |
Bzip2 | =0.9.0a | |
Bzip2 | =0.9.0 | |
Bzip2 | =0.9.5a | |
Bzip2 | =0.9.5b | |
Bzip2 | =0.9.0c | |
Bzip2 | =1.0.1 | |
Bzip2 | =0.9.5c | |
Bzip2 | =0.9.0b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0759 affects bzip2 versions prior to 1.0.2, specifically 0.9.0 through 1.0.1.
CVE-2002-0759 allows attackers to overwrite files during decompression without warning, due to the absence of the O_EXCL flag.
To protect against CVE-2002-0759, update bzip2 to version 1.0.2 or later.
CVE-2002-0759 affects FreeBSD 4.5 and earlier, OpenLinux 3.1 and 3.1.1, among possibly others.
A workaround for CVE-2002-0759 is to manually verify file names before running the decompression to avoid unintentional overwriting.