Vulnerability Bulletins |
Generación de ficheros con permisos incorrectos en cpio |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Integridad |
Dificulty | Principiante |
Required attacker level | Acceso remoto con cuenta |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | cpio |
Description |
|
Se ha descubierto una vulnerabilidad en cpio, un programa que permite archivar ficheros para realizar copias de seguridad. La vulnerabilidad reside en que cpio con las opciones -O y -F utiliza una umask 0 para generar los ficheros de salida con lo que los archivos tienen permisos de lectura y escritura para todo el mundo. La explotación de esta vulnerabilidad podría permitir a un atacante local leer y escribir en cualquier archivo generado bajo las circunstancias descritas. |
|
Solution |
|
Actualización de software Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1.dsc http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1.diff.gz http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_alpha.deb ARM http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_ia64.deb HP Precision http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/c/cpio/cpio_2.4.2-39woody1_sparc.deb Mandrake Linux Mandrakelinux 9.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/cpio-2.5-4.1.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/cpio-2.5-4.1.92mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/cpio-2.5-4.1.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/cpio-2.5-4.1.92mdk.src.rpm Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/cpio-2.5-4.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/cpio-2.5-4.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/cpio-2.5-4.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/cpio-2.5-4.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/cpio-2.5-4.2.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/cpio-2.5-4.2.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/cpio-2.5-4.2.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/cpio-2.5-4.2.101mdk.src.rpm Mandrake Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/cpio-2.5-4.1.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/cpio-2.5-4.1.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/cpio-2.5-4.1.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/cpio-2.5-4.1.C21mdk.src.rpm Mandrake Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/cpio-2.5-4.1.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/cpio-2.5-4.1.C30mdk.src.rpm x86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/cpio-2.5-4.1.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/cpio-2.5-4.1.C30mdk.src.rpm Red Hat Linux Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) Red Hat Desktop (v. 3) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) https://rhn.redhat.com/ |
|
Standar resources |
|
Property | Value |
CVE | CAN-1999-1572 |
BID | |
Other resources |
|
Debian Security Advisory DSA 664-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00042.html Mandrakesoft Security Advisories MDKSA-2005:032 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032 Mandrakesoft Security Advisories MDKSA-2005:032-1 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:032-1 Red Hat Security Advisory RHSA-2005:073-07 https://rhn.redhat.com/errata/RHSA-2005-073.html Red Hat Security Advisory RHSA-2005:080-06 https://rhn.redhat.com/errata/RHSA-2005-080.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-02-03 |
1.1 | Aviso emitido por Mandrake (MDKSA-2005:032) | 2005-02-11 |
1.2 | Aviso actualizado por Mandrake (MDKSA-2005:032-1) | 2005-02-14 |
1.3 | Aviso emitido por Red Hat (RHSA-2005:073-07) | 2005-02-16 |
1.4 | Aviso emitido por Red Hat (RHSA-2005:080-06) | 2005-02-21 |