Show plain JSON{"id": "CVE-2002-0761", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2002-08-12T04:00:00.000", "references": [{"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-039.0.txt", "source": "cve@mitre.org"}, {"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:25.bzip2.asc", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.iss.net/security_center/static/9128.php", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/4776", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "bzip2 before 1.0.2 in FreeBSD 4.5 and earlier, OpenLinux 3.1 and 3.1.1, and possibly systems, uses the permissions of symbolic links instead of the actual files when creating an archive, which could cause the files to be extracted with less restrictive permissions than intended."}, {"lang": "es", "value": "bzip2 anterioes a 1.0.2 en FreeBSD 4.5 y anteriores, y otros Sistemas Operativos, utilizan los permisos de enlaces simb\u00f3licos (symbolic links) en lugar de los del archivo actual cuando crea un nuevo fichero, lo cual podr\u00eda causar que el fichero fuese extraido con unos permisos menos restrictivos de lo que se pretend\u00eda."}], "lastModified": "2008-09-05T20:28:52.927", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "325C63C7-740D-42E1-B8B1-51125DE57F61"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "550690C7-32D0-4126-B272-D2254A2EF434"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFE746CF-6890-4259-A9DB-5F77B592D1E9"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C95FE39-842A-45D1-A858-D438C0C15B99"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8AD6CE9-FCE5-4926-A1D1-0706DFE4A6D4"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D54DD36D-7A6C-4649-855A-D81F29FFB6C9"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B87D623-6CF8-4BDB-A9FB-CF07589AF1CB"}, {"criteria": "cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FE3BFE7-75B6-4284-9EDC-78D452CD9174"}, {"criteria": "cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B10B3BF9-BE42-468D-89E8-8D4A5FEDC734"}, {"criteria": "cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E55F00B1-D48B-40A6-872F-959598D7E6E4"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}