Executive Summary
Summary | |
---|---|
Title | New tar packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-987 | First vendor Publication | 2006-03-07 |
Vendor | Debian | Last vendor Modification | 2006-03-07 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Jim Meyering discovered several buffer overflows in GNU tar, which may lead to the execution of arbitrary code through specially crafted tar archives. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 1.14-2.1. For the unstable distribution (sid) this problem has been fixed in version 1.15.1-3. We recommend that you upgrade your tar package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-987 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5252 | |||
Oval ID: | oval:org.mitre.oval:def:5252 | ||
Title: | Security Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS) | ||
Description: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0300 | Version: | 1 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5978 | |||
Oval ID: | oval:org.mitre.oval:def:5978 | ||
Title: | Security Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS) | ||
Description: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0300 | Version: | 1 |
Platform(s): | Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5993 | |||
Oval ID: | oval:org.mitre.oval:def:5993 | ||
Title: | Security Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS) | ||
Description: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0300 | Version: | 1 |
Platform(s): | Sun Solaris 9 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6094 | |||
Oval ID: | oval:org.mitre.oval:def:6094 | ||
Title: | Security Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS) | ||
Description: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0300 | Version: | 1 |
Platform(s): | Sun Solaris 9 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9295 | |||
Oval ID: | oval:org.mitre.oval:def:9295 | ||
Title: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Description: | Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-0300 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-06-03 | Name : Solaris Update for gtar 118191-03 File : nvt/gb_solaris_118191_03.nasl |
2009-06-03 | Name : Solaris Update for gtar 118192-03 File : nvt/gb_solaris_118192_03.nasl |
2009-06-03 | Name : Solaris Update for gtar source 118193-02 File : nvt/gb_solaris_118193_02.nasl |
2009-06-03 | Name : Solaris Update for gtar source 118194-02 File : nvt/gb_solaris_118194_02.nasl |
2009-06-03 | Name : Solaris Update for gtar 139099-02 File : nvt/gb_solaris_139099_02.nasl |
2009-06-03 | Name : Solaris Update for gtar 139100-02 File : nvt/gb_solaris_139100_02.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200603-06 (tar) File : nvt/glsa_200603_06.nasl |
2008-09-04 | Name : FreeBSD Ports: gtar File : nvt/freebsd_gtar.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 987-1 (tar) File : nvt/deb_987_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
23371 | GNU tar PAX Extended Headers Handling Overflow A remote overflow exists in GNU Tar. GNU Tar fails to properly handle PAX extended headers resulting in a buffer overflow. With a specially crafted .tar archive, an attacker can cause arbitrary command execution when the victim lists the tar contents or extracts the archive. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-11-16 | GNU tar PAX extended headers handling overflow attempt RuleID : 32089 - Revision : 2 - Type : FILE-OTHER |
2014-11-16 | GNU tar PAX extended headers handling overflow attempt RuleID : 32088 - Revision : 3 - Type : FILE-OTHER |
2014-11-16 | GNU tar PAX extended headers handling overflow attempt RuleID : 32087 - Revision : 3 - Type : FILE-OTHER |
2014-01-10 | GNU tar PAX extended headers handling overflow attempt RuleID : 16053 - Revision : 10 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-12-02 | Name : The remote host is missing Sun Security Patch number 118191-05 File : solaris9_118191.nasl - Type : ACT_GATHER_INFO |
2008-12-02 | Name : The remote host is missing Sun Security Patch number 118192-05 File : solaris9_x86_118192.nasl - Type : ACT_GATHER_INFO |
2008-09-08 | Name : The remote host is missing Sun Security Patch number 139099-04 File : solaris10_139099.nasl - Type : ACT_GATHER_INFO |
2008-09-08 | Name : The remote host is missing Sun Security Patch number 139100-04 File : solaris10_x86_139100.nasl - Type : ACT_GATHER_INFO |
2007-04-21 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2007-004.nasl - Type : ACT_GATHER_INFO |
2007-03-13 | Name : The remote host is missing a Mac OS X update which fixes a security issue. File : macosx_10_4_9.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-987.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0232.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6107efb9aae311daaea1000854d03344.nasl - Type : ACT_GATHER_INFO |
2006-03-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200603-06.nasl - Type : ACT_GATHER_INFO |
2006-03-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-257-1.nasl - Type : ACT_GATHER_INFO |
2006-03-06 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0232.nasl - Type : ACT_GATHER_INFO |
2006-02-22 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2006-046.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:58 |
|