First published: Tue Sep 18 2007(Updated: )
Directory traversal vulnerability in Archive::Tar perl module allows user-assisted remote attackers to overwrite arbitrary files writable by user running application using this module via an absolute path or a .. (dot dot) sequence in filenames in a TAR archive. Similar issues were reported and fixed for GNU tar during past several years, e.g.: <a href="https://access.redhat.com/security/cve/CVE-2001-1267">CVE-2001-1267</a>, <a href="https://access.redhat.com/security/cve/CVE-2002-0399">CVE-2002-0399</a>, <a href="https://access.redhat.com/security/cve/CVE-2002-1216">CVE-2002-1216</a> and <a href="https://access.redhat.com/security/cve/CVE-2007-4131">CVE-2007-4131</a>. This issue is important when this module is used to extract tar archives from untrusted sources. However, some of such applications either implement workarounds / own checks (sa-update in spamassassin) or dropped module support at all (amavisd-new).
Affected Software | Affected Version | How to fix |
---|---|---|
PEAR Archive_Tar |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-295021 is considered high due to the potential for remote attackers to overwrite arbitrary files.
To fix REDHAT-BUG-295021, update the Archive::Tar module to the latest version that addresses this vulnerability.
Users running applications that utilize the Archive::Tar module in Perl are affected by REDHAT-BUG-295021.
Attackers can exploit REDHAT-BUG-295021 by using absolute paths or dot dot sequences in filenames within a TAR archive.
A possible workaround for REDHAT-BUG-295021 is to restrict the file permissions to prevent the application from overwriting critical files.