This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote EulerOS host is missing multiple security updates.
According to the versions of the cpio package installed, the EulerOS
installation on the remote host is affected by the following
- GNU cpio copies files into or out of a cpio or tar
archive. Archives are files which contain a collection
of other files plus information about them, such as
their file name, owner, timestamps, and access
permissions. The archive can be another file on the
disk, a magnetic tape, or a pipe. GNU cpio supports the
following archive formats: binary, old ASCII, new
ASCII, crc, HPUX binary, HPUX old ASCII, old tar and
POSIX.1 tar. By default, cpio creates binary format
archives, so that they are compatible with older cpio
programs. When it is extracting files from archives,
cpio automatically recognizes which kind of archive it
is reading and can read archives created on machines
with a different byte-order.
- Security Fix(es)
- The cpio_safer_name_suffix function in util.c in cpio
2.11 allows remote attackers to cause a denial of
service (out-of-bounds write) via a crafted cpio
- cpio 2.11, when using the --no-absolute-filenames
option, allows local users to write to arbitrary files
via a symlink attack on a file in an
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected cpio packages.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.1
Public Exploit Available : true