First published: Thu Oct 22 2015(Updated: )
A path traversal vulnerability was found in Busybox implementation of tar. tar will extract a symlink that points outside of the current working directory and then follow that symlink when extracting other files. This allows for a directory traversal attack when extracting untrusted tarballs. Reproducer: <a href="http://git.busybox.net/busybox/commit/?id=a116552869db5e7793ae10968eb3c962c69b3d8c">http://git.busybox.net/busybox/commit/?id=a116552869db5e7793ae10968eb3c962c69b3d8c</a> CVE assignment: <a href="http://seclists.org/oss-sec/2015/q4/121">http://seclists.org/oss-sec/2015/q4/121</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu BusyBox Static |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1274215 is classified as a high severity issue due to its potential to allow directory traversal attacks.
To fix REDHAT-BUG-1274215, update your Busybox package to the latest version that includes the patch addressing this vulnerability.
The potential impacts of REDHAT-BUG-1274215 include unauthorized access to files outside of intended directories, leading to data exposure or system compromise.
Versions of BusyBox that include the tar utility susceptible to the REDHAT-BUG-1274215 vulnerability are affected, particularly older versions.
No, REDHAT-BUG-1274215 specifically affects systems using the BusyBox implementation of tar, which may not be present in all Linux distributions.