CVE-1999-1572

Current Description

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.

Evaluator Description

Fixed in rev 1.3 of cpio/main.c.

Basic Data

PublishedJuly 16, 1996
Last ModifiedOctober 19, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux3.0*******
    2.3OSFreebsdFreebsd2.1.0*******
    2.3OSMandrakesoftMandrake Linux9.2*******
    2.3OSMandrakesoftMandrake Linux10.0*******
    2.3OSMandrakesoftMandrake Linux10.1*******
    2.3OSMandrakesoftMandrake Linuxcs2.1*******
    2.3OSMandrakesoftMandrake Linuxcs3.0*******
    2.3OSRedhatEnterprise Linux4.0*advanced_server*****
    2.3OSRedhatEnterprise Linux4.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux4.0*workstation*****
    2.3OSRedhatEnterprise Linux Desktop4.0*******
    2.3OSUbuntuUbuntu Linux4.10*******

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 2.1.0
Debian Debian Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Ubuntu Ubuntu Linux 4.10
Mandrakesoft Mandrake Linux 10.0, 10.1, 9.2, cs2.1, cs3.0

References

NameSourceURLTags
20050204 [USN-75-1] cpio vulnerabilityhttp://marc.info/?l=bugtraq&m=110763404701519&w=2BUGTRAQ
14357http://secunia.com/advisories/14357SECUNIA
17063http://secunia.com/advisories/17063SECUNIA
17532http://secunia.com/advisories/17532SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdfhttp://support.avaya.com/elmodocs2/security/ASA-2005-212.pdfCONFIRM
DSA-664http://www.debian.org/security/2005/dsa-664DEBIAN
http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391MISCExploit
MDKSA-2005:032http://www.mandriva.com/security/advisories?name=MDKSA-2005:032MANDRAKE
RHSA-2005:073http://www.redhat.com/support/errata/RHSA-2005-073.htmlREDHAT
RHSA-2005:080http://www.redhat.com/support/errata/RHSA-2005-080.htmlREDHAT
RHSA-2005:806http://www.redhat.com/support/errata/RHSA-2005-806.htmlREDHAT
2005-0003http://www.trustix.org/errata/2005/0003/TRUSTIX
cpio-o-archive-insecure-permissions(19167)https://exchange.xforce.ibmcloud.com/vulnerabilities/19167XF
oval:org.mitre.oval:def:10888https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888OVAL