Security-Announce archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

NetBSD Security Advisory 2010-007: Integer overflow in libbz2 decompression code



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                 NetBSD Security Advisory 2010-007
                 =================================

Topic:          Integer overflow in libbz2 decompression code

Version:        NetBSD-current: source prior to September 21, 2010
                NetBSD 5.0:             affected
                NetBSD 4.0.1:           affected
                pkgsrc:                 bzip2 package prior to 1.0.6

Severity:       potential remote DoS or code-injection attack

Fixed:          NetBSD-current:         Sep 20, 2010
                NetBSD-5 branch         Sep 23, 2010
                NetBSD-5-0 branch       Sep 23, 2010
                NetBSD-4 branch         Sep 23, 2010
                NetBSD-4-0 branch       Sep 23, 2010
                pkgsrc 2010Q2:          bzip2-1.0.6 corrects this issue

Please note that NetBSD releases prior to 4.0 are no longer supported.
It is recommended that all users upgrade to a supported release.


Abstract
========

The bzip2/bunzip2 functions and the libbz2 library provide compression
and decompression functionality similar to gzip/gunzip and libgzip but
with better compression ratio and worse compression performance.

The bug described in CVE-2010-0405 affects decompression and can cause
a local or remote DoS attack or possible random code execution
in a program that tries to decompress attacker controlled streams.


Technical Details
=================

There is an integer overflow in the bzip2 decompression code which
can be used to cause a negative value to be used for a buffer size.
The bzip code is also used in other derivative programs such as tar(1)
and pax(1), so utilities using these programs can be affected.


Solutions and Workarounds
=========================

- - Patch, recompile, and re-install libbz2, restart all daemons possibly
  affected

  CVS branch    file                            revision
  ------------- ----------------                --------
  HEAD          src/dist/bzip2/decompress.c     1.2

  netbsd-5.0    src/dist/bzip2/decompress.c     1.1.1.3
  netbsd-5      src/dist/bzip2/decompress.c     1.1.1.3

  netbsd-4.0    src/dist/bzip2/decompress.c     1.1.1.3
  netbsd-4      src/dist/bzip2/decompress.c     1.1.1.3

The following instructions briefly summarize how to update and
recompile libbz2. In these instructions, replace:

  BRANCH   with the appropriate CVS branch (from the above table)
  FILES    with the file names for that branch (from the above table)

To update from CVS, re-build, and re-install libbz2:

        # cd src
        # cvs update -d -P -r BRANCH FILES
        # cd lib/libbz2
        # make USETOOLS=no cleandir dependall
        # make USETOOLS=no install
        # cd ../../rescue
        # make USETOOLS=no cleandir dependall
        # make USETOOLS=no install

Alternatively, apply the following patch (with potential offset
differences):

        
http://ftp.NetBSD.org/pub/NetBSD/security/patches/SA2010-007-libbz2.patch

For more information on building (oriented towards rebuilding the
entire system, however) see:

   http://www.netbsd.org/guide/en/chap-build.html


Thanks To
=========

Mikolaj Izdebski for finding and reporting the vulnerability.
Christos Zoulas for fixing the problem.


Revision History
================

        2010-09-27      Initial release


More Information
================

Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at 
  http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2010-007.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .


Copyright 2010, The NetBSD Foundation, Inc.  All Rights Reserved.
Redistribution permitted only in full, unmodified form.

$NetBSD: NetBSD-SA2010-007.txt,v 1.4 2010/09/27 20:41:45 tonnerre Exp $

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (NetBSD)

iQIcBAEBAgAGBQJMoQRgAAoJEAZJc6xMSnBudBAQALrzG5JCEorlWj2SlcKioO4j
HSTp7K70cT1Ry6YLraqP4CocBeNTv7QoDcvezBpk0KYinTzTaz+jHykWWKl+WR3a
sUFqdsyhJp4eaibpqLeaZlesEinMFhVgwwG4MC2ZMpddZPdcm1FpJ+L01ANI9fKo
NQhPFQ2OxOlpaZjLundE4Iij7vQw9nTo6+ierZYi4SjIZC0DYlPb8aySDpnRa4DV
W2H50hCfJlQKGjQsQiR8alS+JUldG4x59Ci+pTE8QoY6Ndh3Vrwryf/ZaZlBxJ/g
x93emKXFIrz/SwCQM5kQCXOok96tTKUdMr6tza/gETvjtkiYOtoOBpz4Y3Af5mrU
GLgnwJjVQ+uzk7TSOebmOHHCGt/tUhiQdccXzLc141rgeXtrFs4+2hMW4X3RYg7U
puZb7XTRkoCE9lBMZ7h6AMTivbcNFN4gsVHZEa0raQrvV5N3SQCaxSdLiWYS2Rx1
uYGhTigsOtiMoz/2jyb01FugMYgbi3STPtKXHsJ8lzkAX0FwESvsHFY4/1PLrGMZ
Vb9CXzLiM0CURv2YgC1ReUBTIHM6DrtX/HCcNZ0VV19/IsMkZ5iWq2deZu07m5Hu
fu2zEMDeKLtOUCZwSwbvLpDUill059rfg1NYNCzETqpiCCMTLUW/i0/YcrMfzjWU
Sg/u7Cu6yxYp1LrynFDi
=65/e
-----END PGP SIGNATURE-----


Home | Main Index | Thread Index | Old Index