GLSA-201502-11 : GNU cpio: Multiple vulnerabilities

medium Nessus Plugin ID 81369

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201502-11 (GNU cpio: Multiple vulnerabilities)

Two vulnerabilities have been discovered in GNU cpio:
The list_file function in GNU cpio contains a heap-based buffer overflow vulnerability (CVE-2014-9112) A directory traversal vulnerability has been found in GNU cpio (CVE-2015-1197) Impact :

A remote attacker may be able to entice a user to open a specially crafted archive using GNU cpio, possibly resulting in execution of arbitrary code, a Denial of Service condition, or overwriting arbitrary files.
Workaround :

There is no known workaround at this time.

Solution

All GNU cpio users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-arch/cpio-2.11-r3'

See Also

https://security.gentoo.org/glsa/201502-11

Plugin Details

Severity: Medium

ID: 81369

File Name: gentoo_GLSA-201502-11.nasl

Version: 1.5

Type: local

Published: 2/16/2015

Updated: 1/11/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:cpio, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/15/2015

Reference Information

CVE: CVE-2014-9112, CVE-2015-1197

BID: 71248, 71914

GLSA: 201502-11