First published: Thu Dec 15 2005(Updated: )
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Cpio | =2.6-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4268 is classified as a moderate severity vulnerability due to its potential to cause a denial-of-service condition and possible arbitrary code execution.
To fix CVE-2005-4268, upgrade to a newer version of cpio that addresses the buffer overflow issue.
CVE-2005-4268 affects local users on 64-bit platforms running cpio version 2.6-8 on Fedora Core 4.
CVE-2005-4268 is a buffer overflow vulnerability that can be exploited during the creation of cpio archives.
While CVE-2005-4268 primarily leads to denial-of-service, it also has the potential for arbitrary code execution under specific conditions.