First published: Fri Aug 17 2007(Updated: )
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tar | <0:1.14-13.el4_8.1 | 0:1.14-13.el4_8.1 |
redhat/tar | <2:1.15.1-23.0.1.el5_4.2 | 2:1.15.1-23.0.1.el5_4.2 |
redhat/cpio | <0:2.6-23.el5_4.1 | 0:2.6-23.el5_4.1 |
Ubuntu tar | <1.19 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4476 is considered a high severity vulnerability due to the potential for buffer overflow leading to crashes.
To fix CVE-2007-4476, update to the recommended versions of the GNU tar or cpio packages as specified by your software provider.
CVE-2007-4476 affects various versions of GNU tar, Debian Linux 3.1 and 4.0, and Ubuntu Linux 6.06, 7.04, and 7.10.
CVE-2007-4476 is a buffer overflow vulnerability that occurs within the safer_name_suffix function of GNU tar.
The potential impacts of CVE-2007-4476 include application crashes and the possibility of executing arbitrary code.