Lucene search

K
gentooGentoo FoundationGLSA-200506-16
HistoryJun 20, 2005 - 12:00 a.m.

cpio: Directory traversal vulnerability

2005-06-2000:00:00
Gentoo Foundation
security.gentoo.org
22

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0

Percentile

15.7%

Background

cpio is a file archival tool which can also read and write tar files.

Description

A vulnerability has been found in cpio that can potentially allow a cpio archive to extract its files to an arbitrary directory of the creator’s choice.

Impact

An attacker could create a malicious cpio archive which would create files in arbitrary locations on the victim’s system. This issue could also be used in conjunction with a previous race condition vulnerability (CAN-2005-1111) to change permissions on files owned by the victim.

Workaround

There is no known workaround at this time.

Resolution

All cpio users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.6-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/cpio< 2.6-r3UNKNOWN

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

CVSS3

4.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0

Percentile

15.7%