GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Jun 20, 2005 3:38 am Post subject: [ GLSA 200506-16 ] cpio: Directory traversal vulnerability |
|
|
Gentoo Linux Security Advisory
Title: cpio: Directory traversal vulnerability (GLSA 200506-16)
Severity: normal
Exploitable: local
Date: June 20, 2005
Bug(s): #90619
ID: 200506-16
Synopsis
cpio contains a flaw which may allow a specially crafted cpio archive to extract files to an arbitrary directory.
Background
cpio is a file archival tool which can also read and write tar files.
Affected Packages
Package: app-arch/cpio
Vulnerable: < 2.6-r3
Unaffected: >= 2.6-r3
Architectures: All supported architectures
Description
A vulnerability has been found in cpio that can potentially allow a cpio archive to extract its files to an arbitrary directory of the creator's choice.
Impact
An attacker could create a malicious cpio archive which would create files in arbitrary locations on the victim's system. This issue could also be used in conjunction with a previous race condition vulnerability (CAN-2005-1111) to change permissions on files owned by the victim.
Workaround
There is no known workaround at this time.
Resolution
All cpio users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/cpio-2.6-r3" |
References
Original Advisory
CAN-2005-1111
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total |
|