English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55311
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLSA-2005:1002
Summary:Conectiva Security Advisory CLSA-2005:1002
Description:
The remote host is missing updates announced in
advisory CLSA-2005:1002.

This announcement fixes the following vulnerabilities:

CVE-1999-1572
cpio uses a 0 umask when creating files using the -O
(archive) or -F options, which creates the files with
mode 0666 and allows local users to read or overwrite
those files.

CVE-2005-1111
Race condition in cpio 2.6 and earlier allows local users
to modify permissions of arbitrary files via a hard link
attack on a file while it is being decompressed, whose
permissions are changed by cpio after the decompression is
complete.

CVE-2005-1229
Directory traversal vulnerability in cpio 2.6 and earlier
allows remote attackers to write to arbitrary directories
via a .. (dot dot) in a cpio file.

Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=001002
http://www.gnu.org/software/cpio/

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-1999-1572
http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
Debian Security Information: DSA-664 (Google Search)
http://www.debian.org/security/2005/dsa-664
http://www.mandriva.com/security/advisories?name=MDKSA-2005:032
http://www.redhat.com/support/errata/RHSA-2005-073.html
http://www.redhat.com/support/errata/RHSA-2005-080.html
http://www.redhat.com/support/errata/RHSA-2005-806.html
http://www.trustix.org/errata/2005/0003/
Bugtraq: 20050204 [USN-75-1] cpio vulnerability (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110763404701519&w=2
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10888
http://secunia.com/advisories/14357
http://secunia.com/advisories/17063
http://secunia.com/advisories/17532
XForce ISS Database: cpio-o-archive-insecure-permissions(19167)
http://xforce.iss.net/xforce/xfdb/19167
Common Vulnerability Exposure (CVE) ID: CVE-2005-1111
Bugtraq: 20050413 cpio TOCTOU file-permissions vulnerability (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=111342664116120&w=2
Debian Security Information: DSA-846 (Google Search)
http://www.debian.org/security/2005/dsa-846
FreeBSD Security Advisory: FreeBSD-SA-06:03
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc
http://www.redhat.com/support/errata/RHSA-2005-378.html
SCO Security Bulletin: SCOSA-2005.32
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt
SCO Security Bulletin: SCOSA-2006.2
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt
SuSE Security Announcement: SUSE-SR:2006:010 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
http://www.ubuntu.com/usn/usn-189-1
BugTraq ID: 13159
http://www.securityfocus.com/bid/13159
http://www.osvdb.org/15725
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:358
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9783
http://secunia.com/advisories/18290
http://secunia.com/advisories/18395
http://secunia.com/advisories/17123
http://secunia.com/advisories/16998
http://secunia.com/advisories/20117
Common Vulnerability Exposure (CVE) ID: CVE-2005-1229
Bugtraq: 20050420 cpio directory traversal vulnerability (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=111403177526312&w=2
http://www.mandriva.com/security/advisories?name=MDKSA-2007:233
BugTraq ID: 13291
http://www.securityfocus.com/bid/13291
http://www.osvdb.org/17939
http://secunia.com/advisories/27857
XForce ISS Database: cpio-directory-traversal(20204)
http://xforce.iss.net/xforce/xfdb/20204
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.