Lucene search

K
ubuntuUbuntuUSN-234-1
HistoryJan 03, 2006 - 12:00 a.m.

cpio vulnerability

2006-01-0300:00:00
ubuntu.com
36

5.5 Medium

AI Score

Confidence

High

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.2%

Releases

  • Ubuntu 5.10
  • Ubuntu 5.04
  • Ubuntu 4.10

Details

Richard Harms discovered that cpio did not sufficiently validate file
properties when creating archives. Files with e. g. a very large size
caused a buffer overflow. By tricking a user or an automatic backup
system into putting a specially crafted file into a cpio archive, a
local attacker could probably exploit this to execute arbitrary code
with the privileges of the target user (which is likely root in an
automatic backup system).

OSVersionArchitecturePackageVersionFilename
Ubuntu5.10noarchcpio< *UNKNOWN
Ubuntu5.04noarchcpio< *UNKNOWN
Ubuntu4.10noarchcpio< *UNKNOWN

5.5 Medium

AI Score

Confidence

High

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.2%