CVE-2005-4268
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
15/12/2005
Last modified:
03/04/2025
Description
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
Impact
Base Score 2.0
3.70
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
- http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005%3A237
- http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
- http://secunia.com/advisories/18251
- http://secunia.com/advisories/18278
- http://secunia.com/advisories/18280
- http://secunia.com/advisories/18395
- http://secunia.com/advisories/20117
- http://secunia.com/advisories/25098
- http://secunia.com/advisories/25161
- http://www.osvdb.org/22194
- http://www.redhat.com/support/errata/RHSA-2007-0245.html
- http://www.redhat.com/support/errata/RHSA-2010-0145.html
- http://www.securityfocus.com/bid/16057
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23855
- https://issues.rpath.com/browse/RPL-1338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860
- https://usn.ubuntu.com/234-1/
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
- http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005%3A237
- http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
- http://secunia.com/advisories/18251
- http://secunia.com/advisories/18278
- http://secunia.com/advisories/18280
- http://secunia.com/advisories/18395
- http://secunia.com/advisories/20117
- http://secunia.com/advisories/25098
- http://secunia.com/advisories/25161
- http://www.osvdb.org/22194
- http://www.redhat.com/support/errata/RHSA-2007-0245.html
- http://www.redhat.com/support/errata/RHSA-2010-0145.html
- http://www.securityfocus.com/bid/16057
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23855
- https://issues.rpath.com/browse/RPL-1338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860
- https://usn.ubuntu.com/234-1/