First published: Sat Dec 31 2005(Updated: )
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar | =1.13.25 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux Desktop | =3.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1918 has a high severity rating due to its potential for file overwrite vulnerabilities.
To fix CVE-2005-1918, users should update to a patched version of GNU tar or Red Hat Enterprise Linux that addresses this vulnerability.
CVE-2005-1918 affects specific versions of GNU tar and Red Hat Enterprise Linux 2.1 and 3.0.
CVE-2005-1918 can be exploited using crafted tar files that contain directory traversal sequences, such as '/../'.
A temporary workaround for CVE-2005-1918 is to avoid using GNU tar in untrusted environments until a patch can be applied.