Ubuntu 4.10 / 5.04 / 5.10 : cpio vulnerability (USN-234-1)

Ubuntu Security Notice (C) 2006-2013 Canonical, Inc. / NASL script (C) 2006-2013 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Richard Harms discovered that cpio did not sufficiently validate file
properties when creating archives. Files with e. g. a very large size
caused a buffer overflow. By tricking a user or an automatic backup
system into putting a specially crafted file into a cpio archive, a
local attacker could probably exploit this to execute arbitrary code
with the privileges of the target user (which is likely root in an
automatic backup system).

Solution :

Update the affected cpio package.

Risk factor :

Low / CVSS Base Score : 3.7

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 20778 ()

Bugtraq ID:

CVE ID: CVE-2005-4268