First published: Sun Aug 12 2007(Updated: )
Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tar | <2:1.15.1-23.0.1.el5 | 2:1.15.1-23.0.1.el5 |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Rpath Linux | =1 | |
Ubuntu tar | =1.13 | |
Ubuntu tar | =1.13.5 | |
Ubuntu tar | =1.13.11 | |
Ubuntu tar | =1.13.14 | |
Ubuntu tar | =1.13.16 | |
Ubuntu tar | =1.13.17 | |
Ubuntu tar | =1.13.18 | |
Ubuntu tar | =1.13.19 | |
Ubuntu tar | =1.13.25 | |
Ubuntu tar | =1.14 | |
Ubuntu tar | =1.14.90 | |
Ubuntu tar | =1.15 | |
Ubuntu tar | =1.15.1 | |
Ubuntu tar | =1.15.90 | |
Ubuntu tar | =1.15.91 | |
Ubuntu tar | =1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4131 is categorized as a high severity vulnerability due to the potential for unrestricted file overwrite.
To fix CVE-2007-4131, update to GNU tar version 2:1.15.1-23.0.1.el5 or later.
CVE-2007-4131 affects various GNU tar versions, specifically versions from 1.13 through 1.16.
Yes, CVE-2007-4131 can be exploited by remote attackers with user-assisted methods.
CVE-2007-4131 can facilitate directory traversal attacks allowing attackers to overwrite arbitrary files.