First published: Mon Aug 12 2002(Updated: )
bzip2 before 1.0.2 in FreeBSD 4.5 and earlier, OpenLinux 3.1 and 3.1.1, and possibly systems, uses the permissions of symbolic links instead of the actual files when creating an archive, which could cause the files to be extracted with less restrictive permissions than intended.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
bzip2 | =1.0 | |
bzip2 | =0.9.5d | |
bzip2 | =0.9.0a | |
bzip2 | =0.9.0 | |
bzip2 | =0.9.5a | |
bzip2 | =0.9.5b | |
bzip2 | =0.9.0c | |
bzip2 | =1.0.1 | |
bzip2 | =0.9.5c | |
bzip2 | =0.9.0b | |
Bzip2 | =0.9.0 | |
Bzip2 | =0.9.0a | |
Bzip2 | =0.9.0b | |
Bzip2 | =0.9.0c | |
Bzip2 | =0.9.5a | |
Bzip2 | =0.9.5b | |
Bzip2 | =0.9.5c | |
Bzip2 | =0.9.5d | |
Bzip2 | =1.0 | |
Bzip2 | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0761 is considered a moderate severity vulnerability due to its potential impact on file permissions.
To fix CVE-2002-0761, upgrade bzip2 to version 1.0.2 or later.
CVE-2002-0761 affects bzip2 versions prior to 1.0.2 on FreeBSD 4.5 and older, and OpenLinux 3.1 and 3.1.1.
CVE-2002-0761 introduces vulnerabilities related to incorrect file permission handling through symbolic links during archive creation.
There are no specific workarounds for CVE-2002-0761; the recommended action is to upgrade to a patched version of bzip2.