OpenPKG Security Advisory (tar)

2006.03.07
Credit: OpenPKG
Risk: High
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] openpkg (at) openpkg (dot) org [email concealed] OpenPKG-SA-2006.006 05-Mar-2006 ________________________________________________________________________ Package: tar Vulnerability: crazy tar vulnerability OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= tar-1.15.1-20050131 >= tar-1.15.1-20060305 OpenPKG 2.5 <= tar-1.15.1-2.5.0 >= tar-1.15.1-2.5.1 OpenPKG 2.4 <= tar-1.15.1-2.4.0 >= tar-1.15.1-2.4.1 OpenPKG 2.3 <= tar-1.15.1-2.3.0 >= tar-1.15.1-2.3.1 Description: According to a bug report from Jim Meyering [0], a remote overflow exists in the GNU Tape Archiver (Tar). GNU Tar fails to properly handle PAX extended headers resulting in a buffer overflow. With a specially crafted Tar format archive, an attacker can cause arbitrary command execution when the victim lists the Tar contents or extracts the archive. The Common Vulnerabilities and Exposures (CVE) project assigned the id CVE-2006-0300 [2] to the problem. ________________________________________________________________________ References: [0] http://lists.gnu.org/archive/html/bug-tar/2005-06/msg00029.html [1] http://www.gnu.org/software/tar/ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300 ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG <openpkg (at) openpkg (dot) org [email concealed]>" (ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG <openpkg (at) openpkg (dot) org [email concealed]> iD8DBQFECzaVgHWT4GPEy58RAqIPAJ97xcRXBoVoXyoTVPMfsb9J7+CgPgCg8ToY hrKJzn82bsrojmCfVloN/eM= =nL44 -----END PGP SIGNATURE-----


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top