Action not permitted
Modal body text goes here.
cve-2005-1228
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:05.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "name": "15721", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15721" }, { "name": "gzip-n-directory-traversal(20199)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "name": "22033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "15047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15047" }, { "name": "oval:org.mitre.oval:def:382", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "name": "oval:org.mitre.oval:def:170", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "name": "oval:org.mitre.oval:def:11057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "name": "20050420 gzip directory traversal vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "name": "SCOSA-2005.58", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "name": "15721", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15721" }, { "name": "gzip-n-directory-traversal(20199)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "name": "22033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "15047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15047" }, { "name": "oval:org.mitre.oval:def:382", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "name": "oval:org.mitre.oval:def:170", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "name": "oval:org.mitre.oval:def:11057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "name": "20050420 gzip directory traversal vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "name": "SCOSA-2005.58", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "name": "15721", "refsource": "OSVDB", "url": "http://www.osvdb.org/15721" }, { "name": "gzip-n-directory-traversal(20199)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "name": "22033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "15047", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15047" }, { "name": "oval:org.mitre.oval:def:382", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "name": "oval:org.mitre.oval:def:170", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "name": "oval:org.mitre.oval:def:11057", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "name": "20050420 gzip directory traversal vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1228", "datePublished": "2005-04-22T04:00:00", "dateReserved": "2005-04-22T00:00:00", "dateUpdated": "2024-08-07T21:44:05.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-1228\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2017-10-11T01:30:05.717\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D50385A-1D5D-4517-B5FA-1BB60BA4C484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079F39E2-69BF-47AC-87CF-A47D37EA27F8\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-357.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/15047\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/18100\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22033\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-752\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/15721\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/20199\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382\",\"source\":\"cve@mitre.org\"}]}}" } }
ghsa-9855-w374-4v24
Vulnerability from github
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.
{ "affected": [], "aliases": [ "CVE-2005-1228" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-05-02T04:00:00Z", "severity": "MODERATE" }, "details": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "id": "GHSA-9855-w374-4v24", "modified": "2022-05-03T03:14:08Z", "published": "2022-05-03T03:14:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "type": "WEB", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/15047" }, { "type": "WEB", "url": "http://secunia.com/advisories/18100" }, { "type": "WEB", "url": "http://secunia.com/advisories/21253" }, { "type": "WEB", "url": "http://secunia.com/advisories/22033" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-752" }, { "type": "WEB", "url": "http://www.osvdb.org/15721" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19289" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3101" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2005-1228
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-1228", "description": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "id": "GSD-2005-1228", "references": [ "https://www.debian.org/security/2005/dsa-752", "https://access.redhat.com/errata/RHSA-2005:357" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-1228" ], "details": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "id": "GSD-2005-1228", "modified": "2023-12-13T01:20:11.957610Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "name": "15721", "refsource": "OSVDB", "url": "http://www.osvdb.org/15721" }, { "name": "gzip-n-directory-traversal(20199)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "name": "22033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "15047", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15047" }, { "name": "oval:org.mitre.oval:def:382", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "name": "oval:org.mitre.oval:def:170", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "name": "oval:org.mitre.oval:def:11057", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "name": "20050420 gzip directory traversal vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1228" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "name": "15047", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/15047" }, { "name": "DSA-752", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "tags": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18100" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "101816", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "21253", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21253" }, { "name": "15721", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/15721" }, { "name": "19289", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "22033", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22033" }, { "name": "TA06-214A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "20050420 gzip directory traversal vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "name": "gzip-n-directory-traversal(20199)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "name": "oval:org.mitre.oval:def:382", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "name": "oval:org.mitre.oval:def:170", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "name": "oval:org.mitre.oval:def:11057", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:30Z", "publishedDate": "2005-05-02T04:00Z" } } }
rhsa-2005_357
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gzip package is now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The gzip package contains the GNU gzip data compression program.\n\nA bug was found in the way zgrep processes file names. If a user can be\ntricked into running zgrep on a file with a carefully crafted file name,\narbitrary commands could be executed as the user running zgrep. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2005-0758 to this issue.\n\nA bug was found in the way gunzip modifies permissions of files being\ndecompressed. A local attacker with write permissions in the directory in\nwhich a victim is decompressing a file could remove the file being written\nand replace it with a hard link to a different file owned by the victim. \ngunzip then gives the linked file the permissions of the uncompressed file.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0988 to this issue.\n\nA directory traversal bug was found in the way gunzip processes the -N\nflag. If a victim decompresses a file with the -N flag, gunzip fails to\nsanitize the path which could result in a file owned by the victim being\noverwritten. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.\n\nUsers of gzip should upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:357", "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "121514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121514" }, { "category": "external", "summary": "155745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155745" }, { "category": "external", "summary": "156266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156266" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_357.json" } ], "title": "Red Hat Security Advisory: gzip security update", "tracking": { "current_release_date": "2024-11-21T23:38:09+00:00", "generator": { "date": "2024-11-21T23:38:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:357", "initial_release_date": "2005-06-13T12:12:00+00:00", "revision_history": [ { "date": "2005-06-13T12:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-06-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:38:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.src", "product": { "name": "gzip-0:1.3.3-15.rhel4.src", "product_id": "gzip-0:1.3.3-15.rhel4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=src" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.src", "product": { "name": "gzip-0:1.3.3-12.rhel3.src", "product_id": "gzip-0:1.3.3-12.rhel3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-0:1.3.3-15.rhel4.i386", "product_id": "gzip-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-0:1.3.3-12.rhel3.i386", "product_id": "gzip-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390", "product_id": "gzip-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390", "product_id": "gzip-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0758", "discovery_date": "2004-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617573" } ], "notes": [ { "category": "description", "text": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0758" }, { "category": "external", "summary": "RHBZ#1617573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0758", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" } ], "release_date": "2005-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0988", "discovery_date": "2005-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617595" } ], "notes": [ { "category": "description", "text": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0988" }, { "category": "external", "summary": "RHBZ#1617595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0988", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0988" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" } ], "release_date": "2005-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-1228", "discovery_date": "2005-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617616" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1228" }, { "category": "external", "summary": "RHBZ#1617616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1228", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" } ], "release_date": "2005-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
var-200504-0292
Vulnerability from variot
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The gzip utility is prone to a directory-traversal vulnerability. The issue occurs when gunzip is invoked on a malicious archive using the '-N' option. An archive containing an absolute path for a filename that contains '/' characters can cause the file to be written using the absolute path contained in the filename. A remote attacker may leverage this issue using a malicious archive to corrupt arbitrary files with the privileges of the user that is running the vulnerable software. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200505-05
http://security.gentoo.org/
Severity: Normal Title: gzip: Multiple vulnerabilities Date: May 09, 2005 Bugs: #89946, #90626 ID: 200505-05
Synopsis
gzip contains multiple vulnerabilities potentially allowing an attacker to execute arbitrary commands. The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).
Impact
These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.
Workaround
There is no known workaround at this time.
Resolution
All gzip users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"
References
[ 1 ] CAN-2005-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758 [ 2 ] CAN-2005-0988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988 [ 3 ] CAN-2005-1228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200505-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0292", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gzip", "scope": "eq", "trust": 1.9, "vendor": "gnu", "version": "1.3.3" }, { "model": "gzip", "scope": "eq", "trust": 1.9, "vendor": "gnu", "version": "1.2.4" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "gzip", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.3.4" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "network messaging", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.1" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.2" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "integrated management", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.1" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux ia64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.4" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "solaris 10.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "gzip", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.3.2" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.4" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "openpkg", "scope": "eq", "trust": 0.3, "vendor": "openpkg", "version": "2.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "workstation", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "gzip a", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.2.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "ipcop", "scope": "eq", "trust": 0.3, "vendor": "ipcop", "version": "1.4.5" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "openpkg", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "gzip", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.3.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "linux ia32", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "6.0" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.10" } ], "sources": [ { "db": "BID", "id": "13290" }, { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "CNNVD", "id": "CNNVD-200505-671" }, { "db": "NVD", "id": "CVE-2005-1228" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-1228" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ulf Harnhammar\u203b ulfh@update.uu.se\u203bImran Ghory\u203b imranghory@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-671" } ], "trust": 0.6 }, "cve": "CVE-2005-1228", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2005-1228", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-1228", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200505-671", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "CNNVD", "id": "CNNVD-200505-671" }, { "db": "NVD", "id": "CVE-2005-1228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue \"..\" Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The gzip utility is prone to a directory-traversal vulnerability. The issue occurs when gunzip is invoked on a malicious archive using the \u0027-N\u0027 option. \nAn archive containing an absolute path for a filename that contains \u0027/\u0027 characters can cause the file to be written using the absolute path contained in the filename. \nA remote attacker may leverage this issue using a malicious archive to corrupt arbitrary files with the privileges of the user that is running the vulnerable software. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200505-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: gzip: Multiple vulnerabilities\n Date: May 09, 2005\n Bugs: #89946, #90626\n ID: 200505-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\ngzip contains multiple vulnerabilities potentially allowing an attacker\nto execute arbitrary commands. The zgrep utility improperly\nsanitizes arguments, which may come from an untrusted source\n(CAN-2005-0758). \n\nImpact\n======\n\nThese vulnerabilities could allow arbitrary command execution, changing\nthe permissions of arbitrary files, and installation of files to an\naribitrary location in the filesystem. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll gzip users should upgrade to the latest stable version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-arch/gzip-1.3.5-r6\"\n\nReferences\n==========\n\n [ 1 ] CAN-2005-0758\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758\n [ 2 ] CAN-2005-0988\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988\n [ 3 ] CAN-2005-1228\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200505-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n", "sources": [ { "db": "NVD", "id": "CVE-2005-1228" }, { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "BID", "id": "13290" }, { "db": "PACKETSTORM", "id": "38412" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-1228", "trust": 2.8 }, { "db": "SECUNIA", "id": "15047", "trust": 2.4 }, { "db": "OSVDB", "id": "15721", "trust": 1.6 }, { "db": "SECUNIA", "id": "18100", "trust": 1.6 }, { "db": "SECUNIA", "id": "21253", "trust": 1.6 }, { "db": "SECUNIA", "id": "22033", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3101", "trust": 1.6 }, { "db": "BID", "id": "19289", "trust": 1.6 }, { "db": "USCERT", "id": "TA06-214A", "trust": 1.6 }, { "db": "XF", "id": "20199", "trust": 1.4 }, { "db": "BID", "id": "13290", "trust": 1.1 }, { "db": "BID", "id": "13582", "trust": 0.8 }, { "db": "BID", "id": "12996", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000230", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20050420 GZIP DIRECTORY TRAVERSAL VULNERABILITY", "trust": 0.6 }, { "db": "SCO", "id": "SCOSA-2005.58", "trust": 0.6 }, { "db": "SLACKWARE", "id": "SSA:2006-262", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:170", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:382", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-214A", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:357", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-08-01", "trust": 0.6 }, { "db": "SUNALERT", "id": "101816", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-752", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200505-671", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "38412", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "13290" }, { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-671" }, { "db": "NVD", "id": "CVE-2005-1228" } ] }, "id": "VAR-200504-0292", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4615448 }, "last_update_date": "2024-07-23T20:47:38.700000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AXSA-2005-51:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=87" }, { "title": "AXSA-2006-27:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=342" }, { "title": "bzip2", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/bzip2.html" }, { "title": "gzip", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/gzip.html" }, { "title": "AXSA-2005-48:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=86" }, { "title": "RHSA-2005:357", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2005-357.html" }, { "title": "RHSA-2005:474", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2005-474.html" }, { "title": "101816", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "title": "101816", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-3" }, { "title": "TLSA-2005-59", "trust": 0.8, "url": "http://www.turbolinux.com/security/2005/tlsa-2005-59.txt" }, { "title": "RHSA-2005:357", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-357j.html" }, { "title": "RHSA-2005:474", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-474j.html" }, { "title": "TLSA-2005-59", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2005/tlsa-2005-59j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-1228" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/15047" }, { "trust": 1.9, "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2005-357.html" }, { "trust": 1.9, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "trust": 1.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/19289" }, { "trust": 1.6, "url": "http://www.osvdb.org/15721" }, { "trust": 1.6, "url": "http://www.debian.org/security/2005/dsa-752" }, { "trust": 1.6, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22033" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21253" }, { "trust": 1.6, "url": "http://secunia.com/advisories/18100" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html" }, { "trust": 1.6, "url": "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.58/scosa-2005.58.txt" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/20199" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11057" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a170" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a382" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-1228" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-1228" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/12996" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13582" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13290" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3101" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=111402732406477\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:382" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:170" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf" }, { "trust": 0.3, "url": "http://www.gzip.org/" }, { "trust": 0.3, "url": "http://www.ipcop.org/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=21\u0026mode=thread\u0026order=0\u0026thold=0" }, { "trust": 0.3, "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html" }, { "trust": 0.3, "url": "/archive/1/396397" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0758" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-1228" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0988" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0758" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.0" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1228" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200505-05.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0988" } ], "sources": [ { "db": "BID", "id": "13290" }, { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-671" }, { "db": "NVD", "id": "CVE-2005-1228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "13290" }, { "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-671" }, { "db": "NVD", "id": "CVE-2005-1228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-04-20T00:00:00", "db": "BID", "id": "13290" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "date": "2005-07-02T00:59:07", "db": "PACKETSTORM", "id": "38412" }, { "date": "2005-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-671" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-1228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-08-02T20:26:00", "db": "BID", "id": "13290" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000230" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-671" }, { "date": "2017-10-11T01:30:05.717000", "db": "NVD", "id": "CVE-2005-1228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-671" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "gzip of zgrep Vulnerable to arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000230" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-671" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.