Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-38185

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.215
EPSS Ranking 95.3%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 6.8
Products affected by CVE-2021-38185
  • Gnu » Cpio » Version: N/A
    cpe:2.3:a:gnu:cpio:-
  • Gnu » Cpio » Version: 1.0
    cpe:2.3:a:gnu:cpio:1.0
  • Gnu » Cpio » Version: 1.1
    cpe:2.3:a:gnu:cpio:1.1
  • Gnu » Cpio » Version: 1.2
    cpe:2.3:a:gnu:cpio:1.2
  • Gnu » Cpio » Version: 1.3
    cpe:2.3:a:gnu:cpio:1.3
  • Gnu » Cpio » Version: 2.10
    cpe:2.3:a:gnu:cpio:2.10
  • Gnu » Cpio » Version: 2.11
    cpe:2.3:a:gnu:cpio:2.11
  • Gnu » Cpio » Version: 2.12
    cpe:2.3:a:gnu:cpio:2.12
  • Gnu » Cpio » Version: 2.13
    cpe:2.3:a:gnu:cpio:2.13
  • Gnu » Cpio » Version: 2.4-2
    cpe:2.3:a:gnu:cpio:2.4-2
  • Gnu » Cpio » Version: 2.5
    cpe:2.3:a:gnu:cpio:2.5
  • Gnu » Cpio » Version: 2.5.90
    cpe:2.3:a:gnu:cpio:2.5.90
  • Gnu » Cpio » Version: 2.6
    cpe:2.3:a:gnu:cpio:2.6
  • Gnu » Cpio » Version: 2.7
    cpe:2.3:a:gnu:cpio:2.7
  • Gnu » Cpio » Version: 2.8
    cpe:2.3:a:gnu:cpio:2.8
  • Gnu » Cpio » Version: 2.9
    cpe:2.3:a:gnu:cpio:2.9


Contact Us

Shodan ® - All rights reserved