Executive Summary

Summary
Title PEAR Archive_Tar: Remote code execution vulnerability
Informations
Name GLSA-202006-14 First vendor Publication 2020-06-15
Vendor Gentoo Last vendor Modification 2020-06-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overall CVSS Score 8.8
Base Score 8.8 Environmental Score 8.8
impact SubScore 5.9 Temporal Score 8.8
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A buffer overflow in the PEAR module Archive_Tar might allow local or remote attacker(s) to execute arbitrary code.

Background

This class provides handling of tar files in PHP.

Description

An issue was discovered in the PEAR module Archive_Tar's handling of file paths within Tar achives.

Impact

A local or remote attacker could possibly execute arbitrary code with the privileges of the process.

Workaround

Avoid handling untrusted Tar files with this package until you have upgraded to a non-vulnerable version.

Resolution

All PEAR-Archive_Tar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/PEAR-Archive_Tar-1.4.5"

References

[ 1 ] CVE-2018-1000888 : https://nvd.nist.gov/vuln/detail/CVE-2018-1000888

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/202006-14

Original Source

Url : http://security.gentoo.org/glsa/glsa-202006-14.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-502 Deserialization of Untrusted Data

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 3
Os 2

Snort® IPS/IDS

Date Description
2019-03-14 PEAR Archive_Tar PHP object injection attempt
RuleID : 49185 - Revision : 1 - Type : INDICATOR-COMPROMISE
2019-03-14 PEAR Archive_Tar PHP object injection attempt
RuleID : 49184 - Revision : 1 - Type : INDICATOR-COMPROMISE

Nessus® Vulnerability Scanner

Date Description
2019-01-16 Name : A PHP application running on the remote web server is affected by multiple vu...
File : drupal_8_6_6.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2024-11-12 10:36:17
  • First insertion