5
CVSSv2

CVE-2014-9112

Published: 02/12/2014 Updated: 08/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote malicious users to cause a denial of service via a large block value in a cpio archive.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu cpio 2.11

debian debian linux 7.0

Vendor Advisories

Synopsis Moderate: cpio security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated cpio packages that fix one security issue and two bugs are now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having Moderate security impact A Common Vuln ...
Debian Bug report logs - #772793 cpio: CVE-2014-9112 Package: cpio; Maintainer for cpio is Anibal Monsalve Salazar <anibal@debianorg>; Source for cpio is src:cpio (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 11 Dec 2014 06:21:01 UTC Severity: grave Tags: security Found in versi ...
The GNU cpio program could be made to crash or run programs if it opened a specially crafted file or received specially crafted input ...
Michal Zalewski discovered an out of bounds write issue in cpio, a tool for creating and extracting cpio archive files In the process of fixing that issue, the cpio developers found and fixed additional range checking and null pointer dereference issues For the stable distribution (wheezy), this problem has been fixed in version 211+dfsg-01+deb ...