FreeBSD : gtar -- GNUTYPE_NAMES directory traversal vulnerability (3dd7eb58-80ae-11db-b4ec-000854d03344)

medium Nessus Plugin ID 23759

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Teemu Salmela reports :

There is a tar record type, called GNUTYPE_NAMES (an obsolete GNU extension), that allows the creation of symbolic links pointing to arbitrary locations in the filesystem, which makes it possible to create/overwrite arbitrary files.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?1dbe1a99

http://www.nessus.org/u?b88fb2df

Plugin Details

Severity: Medium

ID: 23759

File Name: freebsd_pkg_3dd7eb5880ae11dbb4ec000854d03344.nasl

Version: 1.14

Type: local

Published: 12/4/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gtar, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/30/2006

Vulnerability Publication Date: 11/21/2006

Reference Information

CVE: CVE-2006-6097

BID: 21235