// For flags

CVE-2008-1372

bzip2: crash on malformed archive file

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.

El archivo bzlib.c en bzip2 versiones anteriores a 1.0.5, permite a los atacantes remotos asistidos por el usuario causar una denegación de servicio (bloqueo) por medio de un archivo diseñado que activa una lectura excesiva del búfer, como es demostrado por el conjunto de pruebas PROTOS GENOME para Formatos de Archivo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-03-18 CVE Reserved
  • 2008-03-18 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2024-08-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (48)
URL Tag Source
http://kb.vmware.com/kb/1006982 X_refsource_confirm
http://kb.vmware.com/kb/1007198 X_refsource_confirm
http://kb.vmware.com/kb/1007504 X_refsource_confirm
http://secunia.com/advisories/29410 Third Party Advisory
http://secunia.com/advisories/29475 Third Party Advisory
http://secunia.com/advisories/29497 Third Party Advisory
http://secunia.com/advisories/29506 Third Party Advisory
http://secunia.com/advisories/29656 Third Party Advisory
http://secunia.com/advisories/29677 Third Party Advisory
http://secunia.com/advisories/29698 Third Party Advisory
http://secunia.com/advisories/29940 Third Party Advisory
http://secunia.com/advisories/31204 Third Party Advisory
http://secunia.com/advisories/31869 Third Party Advisory
http://secunia.com/advisories/31878 Third Party Advisory
http://secunia.com/advisories/36096 Third Party Advisory
http://support.apple.com/kb/HT3757 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0118 X_refsource_confirm
http://www.bzip.org/CHANGES X_refsource_confirm
http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html X_refsource_misc
http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive X_refsource_misc
http://www.ipcop.org/index.php?name=News&file=article&sid=40 X_refsource_confirm
http://www.kb.cert.org/vuls/id/813451 Third Party Advisory
http://www.securityfocus.com/archive/1/489968/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/498863/100/0/threaded Mailing List
http://www.securitytracker.com/id?1020867 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA09-218A.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/0915 Vdb Entry
http://www.vupen.com/english/advisories/2008/2557 Vdb Entry
http://www.vupen.com/english/advisories/2009/2172 Vdb Entry
https://bugs.gentoo.org/attachment.cgi?id=146488&action=view X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/41249 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467 Signature
URL Date SRC
http://www.securityfocus.com/bid/28286 2024-08-07
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9
Search vendor "Bzip" for product "Bzip2" and version "0.9"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9.5a
Search vendor "Bzip" for product "Bzip2" and version "0.9.5a"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9.5b
Search vendor "Bzip" for product "Bzip2" and version "0.9.5b"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9.5c
Search vendor "Bzip" for product "Bzip2" and version "0.9.5c"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9.5d
Search vendor "Bzip" for product "Bzip2" and version "0.9.5d"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9_a
Search vendor "Bzip" for product "Bzip2" and version "0.9_a"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9_b
Search vendor "Bzip" for product "Bzip2" and version "0.9_b"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
0.9_c
Search vendor "Bzip" for product "Bzip2" and version "0.9_c"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
1.0
Search vendor "Bzip" for product "Bzip2" and version "1.0"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
1.0.1
Search vendor "Bzip" for product "Bzip2" and version "1.0.1"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
1.0.2
Search vendor "Bzip" for product "Bzip2" and version "1.0.2"
-
Affected
Bzip
Search vendor "Bzip"
Bzip2
Search vendor "Bzip" for product "Bzip2"
1.0.3
Search vendor "Bzip" for product "Bzip2" and version "1.0.3"
-
Affected