Ubuntu 4.10 / 5.04 : cpio vulnerabilities (USN-189-1)

Ubuntu Security Notice (C) 2005-2015 Canonical, Inc. / NASL script (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Imran Ghory found a race condition in the handling of output files.
While a file was unpacked with cpio, a local attacker with write
permissions to the target directory could exploit this to change the
permissions of arbitrary files of the cpio user. (CAN-2005-1111)

Imran Ghory discovered a path traversal vulnerability. Even when the
--no-absolute-filenames option was specified, cpio did not filter out
'..' path components. By tricking an user into unpacking a malicious
cpio archive, this could be exploited to install files in arbitrary
paths with the privileges of the user calling cpio. (CAN-2005-1229).

Solution :

Update the affected cpio package.

Risk factor :

Medium / CVSS Base Score : 4.6
CVSS Temporal Score : 4.0
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 20601 ()

Bugtraq ID: 13159

CVE ID: CVE-2005-1111