CERTA-2005-AVI-069

Vulnerability from certfr_avis - Published: 2005-02-14 - Updated: 2005-10-06

None

Description

cpio est un logiciel libre permettant la création et la manipulation d'archives.
Une vulnérabilité dans la gestion des droits de l'archive générée lors de l'utilisation de l'option -o ou -create, en omettant de spécifier l'option -O, permet à un utilisateur mal intentionné de porter atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Toutes les versions de cpio.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eToutes les versions de \u003cTT\u003ecpio\u003c/TT\u003e.\u003c/p\u003e",
  "content": "## Description\n\ncpio est un logiciel libre permettant la cr\u00e9ation et la manipulation\nd\u0027archives.  \nUne vuln\u00e9rabilit\u00e9 dans la gestion des droits de l\u0027archive g\u00e9n\u00e9r\u00e9e lors\nde l\u0027utilisation de l\u0027option -o ou -create, en omettant de sp\u00e9cifier\nl\u0027option -O, permet \u00e0 un utilisateur mal intentionn\u00e9 de porter atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-02-14T00:00:00",
  "last_revision_date": "2005-10-06T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:080 du 18 f\u00e9vrier    2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-080.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya pour cpio du 04 octobre 2005 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo pour cpio du 20 juin 2005 :",
      "url": "http://security.gentoo.org/glsa/glsa-200506-16.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 OpenBSD pour gcpio du 11 f\u00e9vrier 2005    :",
      "url": "http://www.vuxml.org/openbsd/"
    },
    {
      "title": "Site Internet de cpio :",
      "url": "http://www.gnu.org/software/cpio/cpio.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:032-1 du 11    f\u00e9vrier 2005 :",
      "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:032 du 10 f\u00e9vrier    2005 :",
      "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:073-07 du 15 f\u00e9vrier    2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-073.html"
    }
  ],
  "reference": "CERTA-2005-AVI-069",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-02-14T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.",
      "revision_date": "2005-02-17T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.",
      "revision_date": "2005-02-21T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo.",
      "revision_date": "2005-06-21T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Avaya.",
      "revision_date": "2005-10-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 de cpio",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-664 du 02 f\u00e9vrier 2005",
      "url": "http://www.debian.org/security/2005/dsa-664"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…