Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
Alexander Cherepanov discovered that GNU cpio incorrectly handled
symbolic links when used with the --no-absolute-filenames option. If a
user or automated system were tricked into extracting a specially
crafted cpio archive, a remote attacker could possibly use this issue
to write arbitrary files. This issue only affected Ubuntu 12.04 LTS
and Ubuntu 14.04 LTS. (CVE-2015-1197)
Gustavo Grieco discovered that GNU cpio incorrectly handled memory
when extracting archive files. If a user or automated system were
tricked into extracting a specially crafted cpio archive, a remote
attacker could use this issue to cause GNU cpio to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected cpio package.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false