Unrated severityNVD Advisory· Published Mar 18, 2008· Updated Apr 23, 2026
CVE-2008-1372
CVE-2008-1372
Description
bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
Affected products
12cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*+ 11 more
- cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
46- www.securityfocus.com/bid/28286nvdExploit
- www.kb.cert.org/vuls/id/813451nvdUS Government Resource
- www.us-cert.gov/cas/techalerts/TA09-218A.htmlnvdUS Government Resource
- ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.ascnvd
- kb.vmware.com/kb/1006982nvd
- kb.vmware.com/kb/1007198nvd
- kb.vmware.com/kb/1007504nvd
- lists.apple.com/archives/security-announce/2009/Aug/msg00001.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.htmlnvd
- secunia.com/advisories/29410nvd
- secunia.com/advisories/29475nvd
- secunia.com/advisories/29497nvd
- secunia.com/advisories/29506nvd
- secunia.com/advisories/29656nvd
- secunia.com/advisories/29677nvd
- secunia.com/advisories/29698nvd
- secunia.com/advisories/29940nvd
- secunia.com/advisories/31204nvd
- secunia.com/advisories/31869nvd
- secunia.com/advisories/31878nvd
- secunia.com/advisories/36096nvd
- security.gentoo.org/glsa/glsa-200903-40.xmlnvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT3757nvd
- wiki.rpath.com/wiki/Advisories:rPSA-2008-0118nvd
- www.bzip.org/CHANGESnvd
- www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.htmlnvd
- www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/nvd
- www.gentoo.org/security/en/glsa/glsa-200804-02.xmlnvd
- www.ipcop.org/index.phpnvd
- www.mandriva.com/security/advisoriesnvd
- www.redhat.com/support/errata/RHSA-2008-0893.htmlnvd
- www.securityfocus.com/archive/1/489968/100/0/threadednvd
- www.securityfocus.com/archive/1/498863/100/0/threadednvd
- www.securitytracker.com/idnvd
- www.slackware.org/security/viewer.phpnvd
- www.vupen.com/english/advisories/2008/0915nvd
- www.vupen.com/english/advisories/2008/2557nvd
- www.vupen.com/english/advisories/2009/2172nvd
- bugs.gentoo.org/attachment.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/41249nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10067nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6467nvd
- usn.ubuntu.com/590-1/nvd
- www.redhat.com/archives/fedora-package-announce/2008-April/msg00165.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2008-April/msg00225.htmlnvd
News mentions
0No linked articles in our index yet.