Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-806: cpio


Vulnerability Assessment Details

RHSA-2005-806: cpio

Vulnerability Assessment Summary
Check for the version of the cpio packages

Detailed Explanation for this Vulnerability Assessment


An updated cpio package that fixes multiple issues is now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

GNU cpio copies files into or out of a cpio or tar archive.

A race condition bug was found in cpio. It is possible for a local
malicious user to modify the permissions of a local file if they have write
access to a directory in which a cpio archive is being extracted. The
Common Vulnerabilities and Exposures project has assigned the name
CVE-2005-1111 to this issue.

It was discovered that cpio uses a 0 umask when creating files using the -O
(archive) option. This creates output files with mode 0666 (all users can
read and write) regardless of the user's umask setting. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-1999-1572 to this issue.

All users of cpio are advised to upgrade to this updated package, which
contains backported fixes for these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-806.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Intel Core i5-2500S 2.7GHz Socket 1155/H2 Quad-Core Processor SR009
$44.99
Intel Core i5-2500S 2.7GHz Socket 1155/H2 Quad-Core Processor SR009  pictureIntel Cpu Xeon Quad Core E5405 2.00Ghz Fsb1333Mhz 12M Lga771 Tray
$243.82
Intel Cpu Xeon Quad Core E5405 2.00Ghz Fsb1333Mhz 12M Lga771 Tray pictureGenuine Intel SR03R Core i7-2640M 2.8 GHz Processor Tested & Working
$39.99
Genuine Intel SR03R Core i7-2640M 2.8 GHz Processor Tested & Working picture10 Pcs Plastic Mounting Clip for Intel 4 Way CPU Coolers
$8.9
10 Pcs Plastic Mounting Clip for Intel 4 Way CPU Coolers picture


Discussions

No Discussions have been posted on this vulnerability.