First published: Sun Aug 12 2007(Updated: )
Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tar | <2:1.15.1-23.0.1.el5 | 2:1.15.1-23.0.1.el5 |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =4.0 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Rpath Rpath Linux | =1 | |
GNU tar | =1.13 | |
GNU tar | =1.13.5 | |
GNU tar | =1.13.11 | |
GNU tar | =1.13.14 | |
GNU tar | =1.13.16 | |
GNU tar | =1.13.17 | |
GNU tar | =1.13.18 | |
GNU tar | =1.13.19 | |
GNU tar | =1.13.25 | |
GNU tar | =1.14 | |
GNU tar | =1.14.90 | |
GNU tar | =1.15 | |
GNU tar | =1.15.1 | |
GNU tar | =1.15.90 | |
GNU tar | =1.15.91 | |
GNU tar | =1.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.