Vulnerability Description
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Cpio | 2.11 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2016/dsa-3483
- http://www.openwall.com/lists/oss-security/2016/01/19/4
- http://www.openwall.com/lists/oss-security/2016/01/22/4
- http://www.securityfocus.com/bid/82293
- http://www.securitytracker.com/id/1035067
- http://www.ubuntu.com/usn/USN-2906-1
- http://www.debian.org/security/2016/dsa-3483
- http://www.openwall.com/lists/oss-security/2016/01/19/4
- http://www.openwall.com/lists/oss-security/2016/01/22/4
- http://www.securityfocus.com/bid/82293
- http://www.securitytracker.com/id/1035067
- http://www.ubuntu.com/usn/USN-2906-1
FAQ
What is CVE-2016-2037?
CVE-2016-2037 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
How severe is CVE-2016-2037?
CVE-2016-2037 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2037?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Cpio, Debian Debian Linux.