First published: Fri Dec 09 2016(Updated: )
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu tar | =1.14 | |
Ubuntu tar | =1.15 | |
Ubuntu tar | =1.15.1 | |
Ubuntu tar | =1.15.90 | |
Ubuntu tar | =1.15.91 | |
Ubuntu tar | =1.16 | |
Ubuntu tar | =1.16.1 | |
Ubuntu tar | =1.17 | |
Ubuntu tar | =1.18 | |
Ubuntu tar | =1.19 | |
Ubuntu tar | =1.20 | |
Ubuntu tar | =1.21 | |
Ubuntu tar | =1.22 | |
Ubuntu tar | =1.23 | |
Ubuntu tar | =1.24 | |
Ubuntu tar | =1.25 | |
Ubuntu tar | =1.26 | |
Ubuntu tar | =1.27 | |
Ubuntu tar | =1.27.1 | |
Ubuntu tar | =1.28 | |
Ubuntu tar | =1.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6321 is considered a medium severity vulnerability that allows attackers to bypass protections and write to arbitrary files.
To fix CVE-2016-6321, update GNU tar to version 1.30 or later, which addresses this directory traversal vulnerability.
CVE-2016-6321 affects GNU tar versions from 1.14 to 1.29 inclusive.
CVE-2016-6321 is a directory traversal vulnerability that exploits improper sanitization of file names.
Yes, CVE-2016-6321 can be exploited by remote attackers to compromise file security.