GNU cpio < 2.13 - Remote Code Execution via Pattern File Integer Overflow
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2021-38185. PoCs published by fangqyi.
AI-analyzed exploit summary This repository contains a functional exploit for CVE-2021-38185, an integer overflow vulnerability in cpio 2.13. The exploit leverages heap manipulation and memory corruption to achieve arbitrary code execution, bypassing most binary protections except full RELRO.
Description
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
Exploits (1)
This repository contains a functional exploit for CVE-2021-38185, an integer overflow vulnerability in cpio 2.13. The exploit leverages heap manipulation and memory corruption to achieve arbitrary code execution, bypassing most binary protections except full RELRO.
References (5)
Scores
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H