← Voltar para CVEs
CVE-2005-4268
N/ADescricao
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado12/15/2005
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
gnu:cpio
Fraquezas (CWE)
CWE-119
Referencias
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc(secalert@redhat.com)
http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237(secalert@redhat.com)
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html(secalert@redhat.com)
http://secunia.com/advisories/18251(secalert@redhat.com)
http://secunia.com/advisories/18278(secalert@redhat.com)
http://secunia.com/advisories/18280(secalert@redhat.com)
http://secunia.com/advisories/18395(secalert@redhat.com)
http://secunia.com/advisories/20117(secalert@redhat.com)
http://secunia.com/advisories/25098(secalert@redhat.com)
http://secunia.com/advisories/25161(secalert@redhat.com)
http://www.osvdb.org/22194(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2007-0245.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2010-0145.html(secalert@redhat.com)
http://www.securityfocus.com/bid/16057(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23855(secalert@redhat.com)
https://issues.rpath.com/browse/RPL-1338(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860(secalert@redhat.com)
https://usn.ubuntu.com/234-1/(secalert@redhat.com)
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc(af854a3a-2127-422b-91ae-364da2661108)
http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237(af854a3a-2127-422b-91ae-364da2661108)
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18251(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18278(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18280(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18395(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20117(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25098(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25161(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/22194(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0245.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0145.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/16057(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23855(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1338(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/234-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.