Lucene search

K
ubuntuUbuntuUSN-2456-1
HistoryJan 08, 2015 - 12:00 a.m.

GNU cpio vulnerabilities

2015-01-0800:00:00
ubuntu.com
27

8.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

89.7%

Releases

  • Ubuntu 14.10
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04
  • Ubuntu 10.04

Packages

  • cpio - a program to manage archives of files

Details

Michal Zalewski discovered an out of bounds write issue in the
process_copy_in function of GNU cpio. An attacker could specially
craft a cpio archive that could create a denial of service or possibly
execute arbitrary code. (CVE-2014-9112)

Jakob Lell discovered a heap-based buffer overflow in the rmt_read__
function of GNU cpioโ€™s rmt client functionality. An attacker
controlling a remote rmt server could use this to cause a denial of
service or possibly execute arbitrary code. This issue only affected
Ubuntu 10.04 LTS. (CVE-2010-0624)

OSVersionArchitecturePackageVersionFilename
Ubuntu14.10noarchcpio<ย 2.11+dfsg-2ubuntu1.1UNKNOWN
Ubuntu14.04noarchcpio<ย 2.11+dfsg-1ubuntu1.1UNKNOWN
Ubuntu12.04noarchcpio<ย 2.11-7ubuntu3.1UNKNOWN
Ubuntu10.04noarchcpio<ย 2.10-1ubuntu2.1UNKNOWN

8.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.024 Low

EPSS

Percentile

89.7%