CVE-2014-9112
cpio: heap-based buffer overflow flaw in list_file()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
6Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
Desbordamiento de buffer basado en memoria dinámica en la función process_copy_in en GNU Cpio 2.11 permite a atacantes remotos causar una denegación de servicio a través de un valor de bloque grande en un archivo cpio.
A heap-based buffer overflow flaw was found in cpio's list_file() function. An attacker could provide a specially crafted archive that, when processed by cpio, would crash cpio, or potentially lead to arbitrary code execution.
The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. A heap-based buffer overflow flaw was found in cpio's list_file() function. An attacker could provide a specially crafted archive that, when processed by cpio, would crash cpio, or potentially lead to arbitrary code execution. This update fixes the following bugs: Previously, during archive creation, cpio internals did not detect a read() system call failure. Based on the premise that the call succeeded, cpio terminated unexpectedly with a segmentation fault without processing further files. The underlying source code has been patched, and an archive is now created successfully.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-11-26 CVE Reserved
- 2014-12-02 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-18 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/62145 | Third Party Advisory | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/71248 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98918 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://seclists.org/fulldisclosure/2014/Nov/74 | 2024-08-06 | |
http://secunia.com/advisories/60167 | 2024-08-06 | |
http://www.openwall.com/lists/oss-security/2014/11/23/2 | 2024-08-06 | |
http://www.openwall.com/lists/oss-security/2014/11/25/2 | 2024-08-06 | |
http://www.openwall.com/lists/oss-security/2014/11/26/20 | 2024-08-06 | |
https://savannah.gnu.org/bugs/?43709 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2014/dsa-3111 | 2017-09-08 | |
http://www.ubuntu.com/usn/USN-2456-1 | 2017-09-08 | |
https://access.redhat.com/security/cve/CVE-2014-9112 | 2015-11-19 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1167571 | 2015-11-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Cpio Search vendor "Gnu" for product "Cpio" | 2.11 Search vendor "Gnu" for product "Cpio" and version "2.11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
|