CERTA-2005-AVI-069
Vulnerability from certfr_avis - Published: 2005-02-14 - Updated: 2005-10-06None
Description
cpio est un logiciel libre permettant la création et la manipulation
d'archives.
Une vulnérabilité dans la gestion des droits de l'archive générée lors
de l'utilisation de l'option -o ou -create, en omettant de spécifier
l'option -O, permet à un utilisateur mal intentionné de porter atteinte
à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Toutes les versions de cpio.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eToutes les versions de \u003cTT\u003ecpio\u003c/TT\u003e.\u003c/p\u003e",
"content": "## Description\n\ncpio est un logiciel libre permettant la cr\u00e9ation et la manipulation\nd\u0027archives. \nUne vuln\u00e9rabilit\u00e9 dans la gestion des droits de l\u0027archive g\u00e9n\u00e9r\u00e9e lors\nde l\u0027utilisation de l\u0027option -o ou -create, en omettant de sp\u00e9cifier\nl\u0027option -O, permet \u00e0 un utilisateur mal intentionn\u00e9 de porter atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-02-14T00:00:00",
"last_revision_date": "2005-10-06T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:080 du 18 f\u00e9vrier 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-080.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya pour cpio du 04 octobre 2005 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo pour cpio du 20 juin 2005 :",
"url": "http://security.gentoo.org/glsa/glsa-200506-16.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD pour gcpio du 11 f\u00e9vrier 2005 :",
"url": "http://www.vuxml.org/openbsd/"
},
{
"title": "Site Internet de cpio :",
"url": "http://www.gnu.org/software/cpio/cpio.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:032-1 du 11 f\u00e9vrier 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:032 du 10 f\u00e9vrier 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:073-07 du 15 f\u00e9vrier 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-073.html"
}
],
"reference": "CERTA-2005-AVI-069",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-02-14T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.",
"revision_date": "2005-02-17T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.",
"revision_date": "2005-02-21T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2005-06-21T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Avaya.",
"revision_date": "2005-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de cpio",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-664 du 02 f\u00e9vrier 2005",
"url": "http://www.debian.org/security/2005/dsa-664"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…