CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
79.6%
CentOS Errata and Security Advisory CESA-2007:0245
GNU cpio copies files into or out of a cpio or tar archive.
A buffer overflow was found in cpio on 64-bit platforms. By tricking a
user into adding a specially crafted large file to a cpio archive, a local
attacker may be able to exploit this flaw to execute arbitrary code with
the target userโs privileges. (CVE-2005-4268)
This erratum also addresses the following bugs:
cpio did not set exit codes appropriately.
cpio did not create a ram disk properly.
All users of cpio are advised to upgrade to this updated package, which
contains backported fixes to correct these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-May/075863.html
https://lists.centos.org/pipermail/centos-announce/2007-May/088636.html
Affected packages:
cpio
Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0245
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 4 | ia64 | cpio | <ย 2.5-13.RHEL4 | cpio-2.5-13.RHEL4.ia64.rpm |
CentOS | 4 | s390 | cpio | <ย 2.5-13.RHEL4 | cpio-2.5-13.RHEL4.s390.rpm |
CentOS | 4 | s390x | cpio | <ย 2.5-13.RHEL4 | cpio-2.5-13.RHEL4.s390x.rpm |