Mandriva Linux Security Advisory : cpio (MDVSA-2015:065)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

Updated cpio package fixes security vulnerabilities :

Heap-based buffer overflow in the process_copy_in function in GNU Cpio
2.11 allows remote attackers to cause a denial of service via a large
block value in a cpio archive (CVE-2014-9112).

Additionally, a NULL pointer dereference in the copyin_link function
which could cause a denial of service has also been fixed.

In GNU Cpio 2.11, the --no-absolute-filenames option limits extracting
contents of an archive to be strictly inside a current directory.
However, it can be bypassed with symlinks. While extracting an
archive, it will extract symlinks and then follow them if they are
referenced in further entries. This can be exploited by a rogue
archive to write files outside the current directory (CVE-2015-1197).

See also :

http://advisories.mageia.org/MGASA-2014-0528.html
http://advisories.mageia.org/MGASA-2015-0080.html

Solution :

Update the affected cpio package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82318 ()

Bugtraq ID:

CVE ID: CVE-2014-9112
CVE-2015-1197

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now