CVE-2006-6097

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.

References

ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc

http://docs.info.apple.com/article.html?artnum=305214

http://kb.vmware.com/KanisaPlatform/Publishing/817/2240267_f.SAL_Public.html

http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html

http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050812.html

http://rhn.redhat.com/errata/RHSA-2006-0749.html

http://secunia.com/advisories/23115

http://secunia.com/advisories/23117

http://secunia.com/advisories/23142

http://secunia.com/advisories/23146

http://secunia.com/advisories/23163

http://secunia.com/advisories/23173

http://secunia.com/advisories/23198

http://secunia.com/advisories/23209

http://secunia.com/advisories/23314

http://secunia.com/advisories/23443

http://secunia.com/advisories/23514

http://secunia.com/advisories/23911

http://secunia.com/advisories/24479

http://secunia.com/advisories/24636

http://security.freebsd.org/advisories/FreeBSD-SA-06:26.gtar.asc

http://security.gentoo.org/glsa/glsa-200612-10.xml

http://securityreason.com/securityalert/1918

http://securitytracker.com/id?1017423

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.469379

http://support.avaya.com/elmodocs2/security/ASA-2007-015.htm

http://www.debian.org/security/2006/dsa-1223

http://www.mandriva.com/security/advisories?name=MDKSA-2006:219

http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.038.html

http://www.securityfocus.com/archive/1/453286/100/0/threaded

http://www.securityfocus.com/archive/1/464268/100/0/threaded

http://www.securityfocus.com/bid/21235

http://www.trustix.org/errata/2006/0068/

http://www.ubuntu.com/usn/usn-385-1

http://www.us-cert.gov/cas/techalerts/TA07-072A.html

http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html

http://www.vupen.com/english/advisories/2006/4717

http://www.vupen.com/english/advisories/2006/5102

http://www.vupen.com/english/advisories/2007/0930

http://www.vupen.com/english/advisories/2007/1171

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=216937

https://issues.rpath.com/browse/RPL-821

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10963

Details

Source: MITRE

Published: 2006-11-24

Updated: 2018-10-17

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 4.9

Severity: MEDIUM

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
127428NewStart CGSL MAIN 4.05 : tar Multiple Vulnerabilities (NS-SA-2019-0153)NessusNewStart CGSL Local Security Checks
high
127307NewStart CGSL MAIN 4.06 : tar Multiple Vulnerabilities (NS-SA-2019-0089)NessusNewStart CGSL Local Security Checks
high
67428Oracle Linux 3 / 4 : tar (ELSA-2006-0749)NessusOracle Linux Local Security Checks
medium
29585SuSE 10 Security Update : tar (ZYPP Patch Number 2344)NessusSuSE Local Security Checks
medium
27968Ubuntu 5.10 / 6.06 LTS / 6.10 : tar vulnerability (USN-385-1)NessusUbuntu Local Security Checks
medium
27463openSUSE 10 Security Update : tar (tar-2351)NessusSuSE Local Security Checks
medium
27462openSUSE 10 Security Update : tar (tar-2343)NessusSuSE Local Security Checks
medium
3947Mac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003)Nessus Network MonitorWeb Clients
high
24811Mac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003)NessusMacOS X Local Security Checks
critical
24659Slackware 10.0 / 10.1 / 10.2 / 11.0 / 8.1 / 9.0 / 9.1 : tar (SSA:2006-335-01)NessusSlackware Local Security Checks
medium
24603Mandrake Linux Security Advisory : tar (MDKSA-2006:219)NessusMandriva Local Security Checks
medium
23959RHEL 2.1 / 3 / 4 : tar (RHSA-2006:0749)NessusRed Hat Local Security Checks
medium
23941CentOS 3 / 4 : tar (CESA-2006:0749)NessusCentOS Local Security Checks
medium
23862GLSA-200612-10 : Tar: Directory traversal vulnerabilityNessusGentoo Local Security Checks
medium
23765Debian DSA-1223-1 : tar - input validation errorNessusDebian Local Security Checks
medium
23759FreeBSD : gtar -- GNUTYPE_NAMES directory traversal vulnerability (3dd7eb58-80ae-11db-b4ec-000854d03344)NessusFreeBSD Local Security Checks
medium