Vulnerability Description
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Cpio | 2.6-8 |
Related Weaknesses (CWE)
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
- http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237
- http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
- http://secunia.com/advisories/18251
- http://secunia.com/advisories/18278
- http://secunia.com/advisories/18280
- http://secunia.com/advisories/18395
- http://secunia.com/advisories/20117
- http://secunia.com/advisories/25098
- http://secunia.com/advisories/25161
- http://www.osvdb.org/22194
- http://www.redhat.com/support/errata/RHSA-2007-0245.html
- http://www.redhat.com/support/errata/RHSA-2010-0145.html
- http://www.securityfocus.com/bid/16057
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
FAQ
What is CVE-2005-4268?
CVE-2005-4268 is a vulnerability with a CVSS score of 3.7 (LOW). Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size i...
How severe is CVE-2005-4268?
CVE-2005-4268 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4268?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Cpio.