CVE-2005-4268
Summary
| CVE | CVE-2005-4268 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-12-15 18:11:00 UTC |
| Updated | 2018-10-03 21:34:00 UTC |
| Description | Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| issues.rpath.com/browse/RPL-1338 | CONFIRM | issues.rpath.com | |
| CPIO File Size Stack Buffer Overflow Vulnerability | BID | www.securityfocus.com | |
| Support | REDHAT | www.redhat.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Secunia - Advisories - Ubuntu update for cpio | SECUNIA | secunia.com | |
| Secunia - Advisories - FreeBSD update for cpio | SECUNIA | secunia.com | |
| Cpio Large File Size Handling Denial of Service Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | |
| 172669 – CVE-2005-4268 cpio large filesize buffer overflow | CONFIRM | bugzilla.redhat.com | |
| SuSE Security announcements: [suse-security-announce] SUSE Security Summary Report SUSE-SR:2006:010 | SUSE | lists.suse.com | |
| rPath update for cpio - Advisories - Secunia | SECUNIA | secunia.com | |
| Secunia - Advisories - Fedora update for cpio | SECUNIA | secunia.com | |
| USN-234-1: cpio vulnerability | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| Support | REDHAT | www.redhat.com | |
| Red Hat Update for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| FreeBSD-SA-06:03 | FREEBSD | ftp.freebsd.org | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| 22194 | OSVDB | www.osvdb.org | |
| SUSE Updates for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| mandriva.com | MANDRIVA | frontal1.mandriva.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2010-03-15 | Mark J Cox | This issue was addressed in Red Hat Enterprise Linux 4 via https://rhn.redhat.com/errata/RHSA-2007-0245.html and in Red Hat Enterprise Linux 3 via https://rhn.redhat.com/errata/RHSA-2010-0145.html. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.