[cpio] buffer overflow vulnerability

Bug #163831 reported by disabled.user
256
Affects Status Importance Assigned to Milestone
cpio (Ubuntu)
New
Undecided
Unassigned

Bug Description

Binary package hint: cpio

References:
http://www.gentoo.org/security/en/glsa/glsa-200711-18.xml

Quoting:
"A buffer overflow vulnerability in the safer_name_suffix() function in GNU cpio has been discovered.
[...]
A remote attacker could entice a user to open a specially crafted archive file resulting in a stack-based buffer overflow, possibly crashing the application. It is disputed whether the execution of arbitrary code is possible."

CVE References

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.