Mandriva Linux Security Advisory : cpio (MDVSA-2015:065)

medium Nessus Plugin ID 82318

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

Updated cpio package fixes security vulnerabilities :

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive (CVE-2014-9112).

Additionally, a NULL pointer dereference in the copyin_link function which could cause a denial of service has also been fixed.

In GNU Cpio 2.11, the --no-absolute-filenames option limits extracting contents of an archive to be strictly inside a current directory.
However, it can be bypassed with symlinks. While extracting an archive, it will extract symlinks and then follow them if they are referenced in further entries. This can be exploited by a rogue archive to write files outside the current directory (CVE-2015-1197).

Solution

Update the affected cpio package.

See Also

http://advisories.mageia.org/MGASA-2014-0528.html

http://advisories.mageia.org/MGASA-2015-0080.html

Plugin Details

Severity: Medium

ID: 82318

File Name: mandriva_MDVSA-2015-065.nasl

Version: 1.4

Type: local

Published: 3/30/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:cpio, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/27/2015

Reference Information

CVE: CVE-2014-9112, CVE-2015-1197

MDVSA: 2015:065