Vulnerability Name:

CVE-2005-4268 (CCN-23855)

Assigned:2005-11-07
Published:2005-11-07
Updated:2018-10-03
Summary:Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-06:03

Source: MITRE
Type: CNA
CVE-2005-4268

Source: MITRE
Type: CNA
CVE-2010-0624

Source: MITRE
Type: CNA
CVE-2010-1168

Source: MITRE
Type: CNA
CVE-2010-1321

Source: MITRE
Type: CNA
CVE-2010-1447

Source: MITRE
Type: CNA
CVE-2010-2063

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2005:237

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:010

Source: CCN
Type: VMSA-2010-0013
VMware ESX third party updates for Service Console

Source: CCN
Type: RHSA-2007-0245
Low: cpio security and bug fix update

Source: CCN
Type: RHSA-2010-0141
Moderate: tar security update

Source: CCN
Type: RHSA-2010-0142
Moderate: tar security update

Source: CCN
Type: RHSA-2010-0143
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0144
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0145
Moderate: cpio security update

Source: CCN
Type: RHSA-2010-0423
Important: krb5 security update

Source: CCN
Type: RHSA-2010-0457
Moderate: perl security update

Source: CCN
Type: RHSA-2010-0458
Moderate: perl security update

Source: CCN
Type: RHSA-2010-0488
Critical: samba and samba3x security update

Source: CCN
Type: RHSA-2010-0770
Critical: java-1.6.0-sun security update

Source: CCN
Type: RHSA-2010-0807
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0873
Critical: java-1.5.0-ibm security update

Source: CCN
Type: RHSA-2010-0935
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2010-0987
Critical: java-1.6.0-ibm security and bug fix update

Source: CCN
Type: RHSA-2011-0152
Moderate: java-1.4.2-ibm security update

Source: CCN
Type: RHSA-2011-0880
Low: Red Hat Network Satellite server IBM Java Runtime security update

Source: CCN
Type: SA18251
Cpio Large File Size Handling Denial of Service Vulnerability

Source: SECUNIA
Type: UNKNOWN
18251

Source: SECUNIA
Type: UNKNOWN
18278

Source: SECUNIA
Type: UNKNOWN
18280

Source: SECUNIA
Type: UNKNOWN
18395

Source: SECUNIA
Type: UNKNOWN
20117

Source: SECUNIA
Type: UNKNOWN
25098

Source: SECUNIA
Type: UNKNOWN
25161

Source: CCN
Type: SA38869
GNU Cpio "rmt" Buffer Overflow Vulnerability

Source: CCN
Type: SA39762
Kerberos GSS-API NULL Pointer Dereference Vulnerability

Source: CCN
Type: SA39845
PostgreSQL Two Vulnerabilities

Source: CCN
Type: SA40145
Samba SMB1 Packet Chaining Memory Corruption Vulnerability

Source: CCN
Type: SA41196
VMware ESX Server Multiple Vulnerabilities

Source: CCN
Type: SA41262
VMware ESX Server Multiple Vulnerabilities

Source: CCN
Type: SA42280
VMware ESX / ESXi Server Update for Multiple Packages

Source: CCN
Type: SA42402
Oracle Solaris Perl Safe Module Security Bypass

Source: CCN
Type: SA42974
Oracle JRockit Multiple Vulnerabilities

Source: CCN
Type: SA43335
Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

Source: CCN
Type: SA47305
F5 Enterprise Manager Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1023988
PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

Source: CCN
Type: SECTRACK ID: 1024062
Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

Source: CCN
Type: SECTRACK ID: 1024107
Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: ASA-2007-251
cpio security and bug fix update (RHSA-2007-0245)

Source: CCN
Type: F5 Networks Web site
Release Note: Enterprise Manager version 2.3.0

Source: DEBIAN
Type: DSA-2052
krb5 -- null pointer dereference

Source: DEBIAN
Type: DSA-2061
samba -- memory corruption

Source: DEBIAN
Type: DSA-2267
perl -- restriction bypass

Source: CCN
Type: GNU Project Web site
Cpio

Source: CCN
Type: Oracle Critical Patch Update Advisory - July 2011
Oracle Critical Patch Update Advisory - July 2011

Source: OSVDB
Type: UNKNOWN
22194

Source: CCN
Type: OSVDB ID: 22194
cpio on 64-bit Large File Size Handling Overflow

Source: CCN
Type: OSVDB ID: 62950
GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

Source: CCN
Type: OSVDB ID: 64744
MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

Source: CCN
Type: OSVDB ID: 64756
PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

Source: CCN
Type: OSVDB ID: 65518
Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

Source: REDHAT
Type: UNKNOWN
RHSA-2007:0245

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0145

Source: BID
Type: UNKNOWN
16057

Source: CCN
Type: BID-16057
CPIO File Size Stack Buffer Overflow Vulnerability

Source: CCN
Type: BID-40235
MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

Source: CCN
Type: BID-40305
Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

Source: CCN
Type: BID-40884
Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

Source: CCN
Type: USN-234-1
cpio vulnerability

Source: CCN
Type: Red Hat Bugzilla Bug 172669
CVE-2005-4268 cpio large filesize buffer overflow

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669

Source: XF
Type: UNKNOWN
cpio-file-size-bo(23855)

Source: XF
Type: UNKNOWN
cpio-file-size-bo(23855)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1338

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10450

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:6860

Source: UBUNTU
Type: UNKNOWN
USN-234-1

Source: SUSE
Type: SUSE-SA:2010:025
Samba security update

Source: SUSE
Type: SUSE-SA:2011:006
IBM Java 6 security update

Source: SUSE
Type: SUSE-SA:2011:014
IBM Java security update

Source: SUSE
Type: SUSE-SR:2006:010
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:011
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:013
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:015
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:016
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2010:019
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2011:008
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-4268 (CCN-56803)

    Assigned:2005-11-07
    Published:2005-11-07
    Updated:2010-03-09
    Summary:Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
    2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38836
    GNU Tar "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA40511
    Sun Solaris GNU Tar and GNU Cpio Buffer Overflow Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: GNU cpio Web page
    Introduction to Cpio

    Source: CCN
    Type: GNU tar Web site
    Tar - GNU Project - Free Software Foundation (FSF)

    Source: CCN
    Type: IBM Security Bulletin T1025085 (Flex System Manager Node)
    IBM Flex System Manager (FSM) is affected by tar vulnerabilities (CVE-2010-0624 CVE-2016-6321)

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-38628
    GNU Tar and GNU Cpio Remote Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    tar-cpio-rmtread-bo(56803)

    Source: SUSE
    Type: SUSE-SA:2010:025
    Samba security update

    Source: SUSE
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: SUSE
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: SUSE
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnu:tar:1.22:*:*:*:*:*:*:*
  • OR cpe:/a:gnu:cpio:2.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:9.0:*:*:*:*:sparc:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/a:quest:intrust_knowledge_pack_for_sun_solaris:10.2.5.1024:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/h:ibm:flex_system_manager_node:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-4268 (CCN-58737)

    Assigned:2005-11-07
    Published:2005-11-07
    Updated:2010-05-17
    Summary:Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
    2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: oss-security Mailing List, 20 May 18:26
    CVE-2010-1974 reject request (dupe of CVE-2010-1168) and CVE-2010-1447 description modification request

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43309
    VMware Products Oracle (Sun) JRE Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: PostgreSQL Web Site
    PostgreSQL Security Information

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40302
    Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: Red Hat Bugzilla Bug 588269
    CVE-2010-1447 perl: Safe restriction bypass when reference to subroutine in compartment is called from outside

    Source: XF
    Type: UNKNOWN
    postgresql-plperl-code-execution(58737)

    Source: SUSE
    Type: SUSE-SA:2010:025
    Samba security update

    Source: SUSE
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: SUSE
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: SUSE
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
  • OR cpe:/a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-4268 (CCN-58747)

    Assigned:2005-11-07
    Published:2005-11-07
    Updated:2010-05-18
    Summary:Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
    2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
    3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA39953
    Heimdal GSS-API and kdc NULL Pointer Dereferences Denial of Service

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA40209
    Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: CCN
    Type: MITKRB5-SA-2010-005
    GSS-API library null pointer dereference

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Heimdal Web site
    2010-05-27 - Tries to follow NULL pointers in KDC and GSS-API Kerberos acceptor (server)

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - October 2010
    Oracle Critical Patch Update Advisory - October 2010

    Source: CCN
    Type: Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010
    Oracle Java SE and Java for Business Critical Patch Update Advisory - October 2010

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: USN-940-1
    Kerberos vulnerabilities

    Source: XF
    Type: UNKNOWN
    kerberos-apreq-dos(58747)

    Source: CCN
    Type: ASA-2010-160
    Avaya Products krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: SUSE
    Type: SUSE-SA:2010:025
    Samba security update

    Source: SUSE
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: SUSE
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: SUSE
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos:5-1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:-:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos:5-1.8:alpha:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04:*:lts:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:avaya:communication_manager:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-4268 (CCN-59481)

    Assigned:2005-11-07
    Published:2005-11-07
    Updated:2010-06-16
    Summary:Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
    2.7 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-4268

    Source: MITRE
    Type: CNA
    CVE-2010-0624

    Source: MITRE
    Type: CNA
    CVE-2010-1168

    Source: MITRE
    Type: CNA
    CVE-2010-1321

    Source: MITRE
    Type: CNA
    CVE-2010-1447

    Source: MITRE
    Type: CNA
    CVE-2010-2063

    Source: CCN
    Type: VMSA-2010-0013
    VMware ESX third party updates for Service Console

    Source: CCN
    Type: RHSA-2007-0245
    Low: cpio security and bug fix update

    Source: CCN
    Type: RHSA-2010-0141
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0142
    Moderate: tar security update

    Source: CCN
    Type: RHSA-2010-0143
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0144
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0145
    Moderate: cpio security update

    Source: CCN
    Type: RHSA-2010-0423
    Important: krb5 security update

    Source: CCN
    Type: RHSA-2010-0457
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0458
    Moderate: perl security update

    Source: CCN
    Type: RHSA-2010-0488
    Critical: samba and samba3x security update

    Source: CCN
    Type: RHSA-2010-0770
    Critical: java-1.6.0-sun security update

    Source: CCN
    Type: RHSA-2010-0807
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0873
    Critical: java-1.5.0-ibm security update

    Source: CCN
    Type: RHSA-2010-0935
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2010-0987
    Critical: java-1.6.0-ibm security and bug fix update

    Source: CCN
    Type: RHSA-2011-0152
    Moderate: java-1.4.2-ibm security update

    Source: CCN
    Type: RHSA-2011-0880
    Low: Red Hat Network Satellite server IBM Java Runtime security update

    Source: CCN
    Type: SA18251
    Cpio Large File Size Handling Denial of Service Vulnerability

    Source: CCN
    Type: SA38869
    GNU Cpio "rmt" Buffer Overflow Vulnerability

    Source: CCN
    Type: SA39762
    Kerberos GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA39845
    PostgreSQL Two Vulnerabilities

    Source: CCN
    Type: SA40145
    Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41196
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41262
    VMware ESX Server Multiple Vulnerabilities

    Source: CCN
    Type: SA41600
    Sun Solaris Samba SMB1 Packet Chaining Memory Corruption Vulnerability

    Source: CCN
    Type: SA41602
    Sun Solaris GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA42280
    VMware ESX / ESXi Server Update for Multiple Packages

    Source: CCN
    Type: SA42402
    Oracle Solaris Perl Safe Module Security Bypass

    Source: CCN
    Type: SA42974
    Oracle JRockit Multiple Vulnerabilities

    Source: CCN
    Type: SA43335
    Avaya Communication Manager krb5 GSS-API NULL Pointer Dereference Vulnerability

    Source: CCN
    Type: SA43887
    Xerox WorkCentre Samba SMB1 Packet Chaining Vulnerability

    Source: CCN
    Type: SA47305
    F5 Enterprise Manager Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1023988
    PostgreSQL Flaws in Safe.pm and PL/Perl Let Remote Authenticated Users Gain Elevated Privileges

    Source: CCN
    Type: SECTRACK ID: 1024062
    Perl Safe Module (Safe::reval and Safe::rdo) Can Be Bypassed

    Source: CCN
    Type: SECTRACK ID: 1024107
    Samba SMB1 Packet Chaining Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Apple Web site
    About Security Update 2010-005

    Source: CCN
    Type: F5 Networks Web site
    Release Note: Enterprise Manager version 2.3.0

    Source: DEBIAN
    Type: DSA-2052
    krb5 -- null pointer dereference

    Source: DEBIAN
    Type: DSA-2061
    samba -- memory corruption

    Source: DEBIAN
    Type: DSA-2267
    perl -- restriction bypass

    Source: CCN
    Type: Oracle Critical Patch Update Advisory - July 2011
    Oracle Critical Patch Update Advisory - July 2011

    Source: CCN
    Type: OSVDB ID: 22194
    cpio on 64-bit Large File Size Handling Overflow

    Source: CCN
    Type: OSVDB ID: 62950
    GNU tar rmt Client lib/rtapelib.c rmt_read__ Function Remote Overflow

    Source: CCN
    Type: OSVDB ID: 64744
    MIT Kerberos 5 GSS-API AP-REQ Authenticator NULL Dereference Remote DoS

    Source: CCN
    Type: OSVDB ID: 64756
    PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Perl Code Execution (2010-1447)

    Source: CCN
    Type: OSVDB ID: 65518
    Samba smbd process.c chain_reply Function SMB1 Packet Chaining Memory Corruption

    Source: CCN
    Type: Samba Web site
    Samba 3.0.x to 3.3.12 are affected by a memory corruption vulnerability.

    Source: CCN
    Type: BID-16057
    CPIO File Size Stack Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-40235
    MIT Kerberos GSS-API Checksum NULL Pointer Dereference Denial Of Service Vulnerability

    Source: CCN
    Type: BID-40305
    Perl Safe Module 'reval()' and 'rdo()' CVE-2010-1447 Restriction-Bypass Vulnerabilities

    Source: CCN
    Type: BID-40884
    Samba 'SMB1 Packet Chaining' Unspecified Remote Memory Corruption Vulnerability

    Source: CCN
    Type: XRX11-002
    Software Update to Address Buffer Overflow

    Source: XF
    Type: UNKNOWN
    samba-smb1-code-execution(59481)

    Source: CCN
    Type: iDefense Labs Public Advisory: 06.16.10
    Samba 3.3.12 Memory Corruption Vulnerability

    Source: SUSE
    Type: SUSE-SA:2010:025
    Samba security update

    Source: SUSE
    Type: SUSE-SA:2011:006
    IBM Java 6 security update

    Source: SUSE
    Type: SUSE-SA:2011:014
    IBM Java security update

    Source: SUSE
    Type: SUSE-SR:2010:011
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:013
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:015
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:016
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2010:019
    SUSE Security Summary Report

    Source: SUSE
    Type: SUSE-SR:2011:008
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.26a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.27a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.2a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.14a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.20b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.22:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.23d:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.24:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.21c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.26:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25b:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25c:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.27:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.28a:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.29:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.31:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.32:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.30:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.28:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.37:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:samba:samba:3.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:vmware:esx:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:novell_linux_pos:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:esx_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*
  • OR cpe:/h:xerox:workcentre_5755:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/h:f5:enterprise_manager:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20054268
    V
    CVE-2005-4268
    2015-11-16
    oval:org.mitre.oval:def:10450
    V
    Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    2013-04-29
    oval:org.mitre.oval:def:6860
    V
    VMware ESX,Service Console update for cpio.
    2010-11-15
    oval:com.redhat.rhsa:def:20100145
    P
    RHSA-2010:0145: cpio security update (Moderate)
    2010-03-15
    oval:com.redhat.rhsa:def:20070245
    P
    RHSA-2007:0245: cpio security and bug fix update (Low)
    2008-03-20
    BACK
    gnu cpio 2.6-8
    gnu tar 1.22
    gnu cpio 2.10
    sun solaris 9.0
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    quest intrust knowledge pack for sun solaris 10.2.5.1024
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    ibm flex system manager node *
    larry_wall perl 5.8.0
    larry_wall perl 5.8.3
    larry_wall perl 5.9.2
    larry_wall perl 5.8.6
    postgresql postgresql 8.0
    postgresql postgresql 8.1
    postgresql postgresql 8.2
    postgresql postgresql 7.4
    larry_wall perl 5.8.1
    larry_wall perl 5.8.8
    postgresql postgresql 8.3
    postgresql postgresql 8.4
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    oracle database server *
    mit kerberos 5-1.1
    mit kerberos 5-1.3
    mit kerberos 5-1.5
    mit kerberos 5-1.2.2
    mit kerberos 5-1.6.3
    mit kerberos 5
    mit kerberos 5-1.2
    mit kerberos 5-1.2.1
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    mit kerberos 5-1.2.8
    mit kerberos 5-1.3.1
    mit kerberos 5-1.3.2
    mit kerberos 5-1.3.3
    mit kerberos 5-1.3.4
    mit kerberos 5-1.3.5
    mit kerberos 5-1.3.6
    mit kerberos 5-1.4
    mit kerberos 5-1.4.1
    mit kerberos 5-1.4.2
    mit kerberos 5-1.4.3
    mit kerberos 5-1.4.4
    mit kerberos 5-1.5.1
    mit kerberos 5-1.5.2
    mit kerberos 5-1.5.3
    mit kerberos 5-1.6
    mit kerberos 5-1.6.1
    mit kerberos 5-1.6.2
    mit kerberos 5-1.3 alpha1
    mit kerberos 5_1.0
    mit kerberos 5_1.0.6
    mit kerberos 5_1.1
    mit kerberos 5_1.1.1
    mit kerberos 5_1.2 beta1
    mit kerberos 5_1.2 beta2
    mit kerberos 5_1.3.3
    mit kerberos 5-1.7
    mit kerberos 5-1.7.1
    mit kerberos 5-1.8
    mit kerberos 5-1.8.1
    mit kerberos 5-1.8 alpha
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    canonical ubuntu 6.06
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    avaya communication manager 5.0
    novell open enterprise server *
    canonical ubuntu 8.04
    novell opensuse 11.0
    avaya communication manager 5.1
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    vmware esx server 4.0
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0
    samba samba 3.0.0
    samba samba 3.0.1
    samba samba 3.0.2
    samba samba 3.0.6
    samba samba 3.0.4
    samba samba 3.0.7
    samba samba 3.0.10
    samba samba 3.0.26a
    samba samba 3.0.27a
    samba samba 3.0.2a
    samba samba 3.0.3
    samba samba 3.0.0
    samba samba 3.0.5
    samba samba 3.0.11
    samba samba 3.0.12
    samba samba 3.0.14
    samba samba 3.0.14a
    samba samba 3.0.15
    samba samba 3.0.16
    samba samba 3.0.17
    samba samba 3.0.18
    samba samba 3.0.19
    samba samba 3.0.20
    samba samba 3.0.20a
    samba samba 3.0.20b
    samba samba 3.0.21
    samba samba 3.0.22
    samba samba 3.0.23
    samba samba 3.0.23a
    samba samba 3.0.23b
    samba samba 3.0.23c
    samba samba 3.0.23d
    samba samba 3.0.24
    samba samba 3.0.21a
    samba samba 3.0.21b
    samba samba 3.0.21c
    samba samba 3.0.13
    samba samba 3.0.26
    samba samba 3.0.25
    samba samba 3.0.25a
    samba samba 3.0.25b
    samba samba 3.0.25c
    samba samba 3.0.8
    samba samba 3.0.9
    samba samba 3.0.25 pre1
    samba samba 3.0.25 pre2
    samba samba 3.0.25 rc1
    samba samba 3.0.25 rc2
    samba samba 3.0.25 rc3
    samba samba 3.0.27
    samba samba 3.0.4 rc1
    samba samba 3.0.28a
    samba samba 3.0.29
    samba samba 3.2.0
    samba samba 3.2.2
    samba samba 3.2.3
    samba samba 3.2.4
    samba samba 3.0.31
    samba samba 3.0.32
    samba samba 3.0.33
    samba samba 3.2.5
    samba samba 3.2.6
    samba samba 3.0.30
    samba samba 3.2.1
    samba samba 3.2.12
    samba samba 3.3.5
    samba samba 3.0.34
    samba samba 3.0.28
    samba samba 3.3.0
    samba samba 3.3.10
    samba samba 3.3.9
    samba samba 3.3.8
    samba samba 3.3.7
    samba samba 3.3.6
    samba samba 3.3.4
    samba samba 3.3.3
    samba samba 3.3.2
    samba samba 3.3.1
    samba samba 3.2.15
    samba samba 3.2.14
    samba samba 3.2.13
    samba samba 3.2.11
    samba samba 3.2.10
    samba samba 3.2.9
    samba samba 3.2.8
    samba samba 3.2.7
    samba samba 3.0.37
    samba samba 3.0.36
    samba samba 3.0.35
    samba samba 3.3.11
    samba samba 3.3.12
    samba samba 3.1.0
    samba samba 3.2
    samba samba 3.3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    mandrakesoft mandrake multi network firewall 2.0
    redhat rhel extras 4
    novell suse linux enterprise server 10
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    vmware esx server 3.0.0
    suse novell linux pos 9
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2008.0
    novell open enterprise server *
    novell opensuse 11.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    apple mac os x 10.5.8
    apple mac os x server 10.5.8
    vmware esx server 4.0
    apple mac os x server 10.6.4
    apple mac os x 10.6.4
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010
    xerox workcentre 5755 -
    redhat enterprise linux 6
    f5 enterprise manager 2.0
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0
    redhat enterprise linux hpc node supplementary 6.0