3.7
CVSSv2

CVE-2005-4268

Published: 15/12/2005 Updated: 03/10/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu cpio 2.6-8

Vendor Advisories

Synopsis Moderate: cpio security update Type/Severity Security Advisory: Moderate Topic An updated cpio package that fixes two security issues is now available forRed Hat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Descripti ...
Debian Bug report logs - #344134 CVE-2005-4268: Buffer overflow on 64 bit archs Package: cpio; Maintainer for cpio is Anibal Monsalve Salazar <anibal@debianorg>; Source for cpio is src:cpio (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Tue, 20 Dec 2005 10:03:04 UTC Severity: important ...
Richard Harms discovered that cpio did not sufficiently validate file properties when creating archives Files with e g a very large size caused a buffer overflow By tricking a user or an automatic backup system into putting a specially crafted file into a cpio archive, a local attacker could probably exploit this to execute arbitrary code with ...