Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9112

Опубликовано: 23 нояб. 2014
Источник: redhat
CVSS2: 5.1
EPSS Низкий

Описание

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

A heap-based buffer overflow flaw was found in cpio's list_file() function. An attacker could provide a specially crafted archive that, when processed by cpio, would crash cpio, or potentially lead to arbitrary code execution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5cpioWill not fix
Red Hat Enterprise Linux 6cpioWill not fix
Red Hat Enterprise Linux 7cpioFixedRHSA-2015:210819.11.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1167571cpio: heap-based buffer overflow flaw in list_file()

EPSS

Процентиль: 79%
0.01343
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

nvd
больше 10 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

debian
больше 10 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio ...

github
больше 3 лет назад

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

oracle-oval
почти 10 лет назад

ELSA-2015-2108: cpio security and bug fix update (MODERATE)

EPSS

Процентиль: 79%
0.01343
Низкий

5.1 Medium

CVSS2