FreeBSD : gtar -- GNUTYPE_NAMES directory traversal vulnerability (3dd7eb58-80ae-11db-b4ec-000854d03344)

Medium Nessus Plugin ID 23759


The remote FreeBSD host is missing a security-related update.


Teemu Salmela reports :

There is a tar record type, called GNUTYPE_NAMES (an obsolete GNU extension), that allows the creation of symbolic links pointing to arbitrary locations in the filesystem, which makes it possible to create/overwrite arbitrary files.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 23759

File Name: freebsd_pkg_3dd7eb5880ae11dbb4ec000854d03344.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2006/12/04

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:gtar, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/11/30

Vulnerability Publication Date: 2006/11/21

Reference Information

CVE: CVE-2006-6097

BID: 21235