First published: Fri Nov 24 2006(Updated: )
GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar | =1.15.1 | |
Ubuntu tar | =1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6097 has a moderate severity rating due to its ability to allow user-assisted attacks that can overwrite arbitrary files.
To fix CVE-2006-6097, it is recommended to upgrade to a patched version of GNU tar that does not allow handling of symbolic links in a malicious manner.
CVE-2006-6097 affects GNU tar versions 1.15.1 and 1.16, among possibly others.
CVE-2006-6097 is not a remote vulnerability; it requires user interaction with a specially crafted tar file.
Symptoms of a CVE-2006-6097 attack may include unexpected overwriting of files or changes to file contents after extracting a tar file.