ghsa-44gv-7gp8-m9mw
Vulnerability from github
Published
2022-05-02 06:12
Modified
2025-04-11 03:39
VLAI Severity ?
Details
Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
{ "affected": [], "aliases": [ "CVE-2010-0405" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-09-28T18:00:00Z", "severity": "MODERATE" }, "details": "Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.", "id": "GHSA-44gv-7gp8-m9mw", "modified": "2025-04-11T03:39:21Z", "published": "2022-05-02T06:12:33Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0405" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882" }, { "type": "WEB", "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230" }, { "type": "WEB", "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231" }, { "type": "WEB", "url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow" }, { "type": "WEB", "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3" }, { "type": "WEB", "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.96.3" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=128506868510655\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/41452" }, { "type": "WEB", "url": "http://secunia.com/advisories/41505" }, { "type": "WEB", "url": "http://secunia.com/advisories/42350" }, { "type": "WEB", "url": "http://secunia.com/advisories/42404" }, { "type": "WEB", "url": "http://secunia.com/advisories/42405" }, { "type": "WEB", "url": "http://secunia.com/advisories/42529" }, { "type": "WEB", "url": "http://secunia.com/advisories/42530" }, { "type": "WEB", "url": "http://secunia.com/advisories/48378" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201301-05.xml" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4581" }, { "type": "WEB", "url": "http://www.bzip.org" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-986-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-986-3" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-986-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2455" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3043" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3052" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3073" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3127" }, { "type": "WEB", "url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…