Vulnerabilities > CVE-2006-0300 - Buffer Overflow vulnerability in GNU Tar Invalid Headers

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
gnu
nessus

Summary

Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.

Vulnerable Configurations

Part Description Count
Application
Gnu
5

Nessus

  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0089_TAR.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.06, has tar packages installed that are affected by multiple vulnerabilities: - Buffer overflow in tar 1.14 through 1.15.90 allows user- assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. (CVE-2006-0300) - GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216. (CVE-2006-6097) - Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive. (CVE-2007-4131) - Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a crashing stack. (CVE-2007-4476) - Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character. (CVE-2010-0624) - Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. (CVE-2016-6321) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127307
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127307
    titleNewStart CGSL MAIN 4.06 : tar Multiple Vulnerabilities (NS-SA-2019-0089)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    # The descriptive text and package checks in this plugin were
    # extracted from ZTE advisory NS-SA-2019-0089. The text
    # itself is copyright (C) ZTE, Inc.
    
    include("compat.inc");
    
    if (description)
    {
      script_id(127307);
      script_version("1.3");
      script_cvs_date("Date: 2019/09/24 11:01:33");
    
      script_cve_id(
        "CVE-2006-0300",
        "CVE-2006-6097",
        "CVE-2007-4131",
        "CVE-2007-4476",
        "CVE-2010-0624",
        "CVE-2016-6321"
      );
    
      script_name(english:"NewStart CGSL MAIN 4.06 : tar Multiple Vulnerabilities (NS-SA-2019-0089)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote machine is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote NewStart CGSL host, running version MAIN 4.06, has tar packages installed that are affected by multiple
    vulnerabilities:
    
      - Buffer overflow in tar 1.14 through 1.15.90 allows user-
        assisted attackers to cause a denial of service
        (application crash) and possibly execute code via
        unspecified vectors involving PAX extended headers.
        (CVE-2006-0300)
    
      - GNU tar 1.16 and 1.15.1, and possibly other versions,
        allows user-assisted attackers to overwrite arbitrary
        files via a tar file that contains a GNUTYPE_NAMES
        record with a symbolic link, which is not properly
        handled by the extract_archive function in extract.c and
        extract_mangle function in mangle.c, a variant of
        CVE-2002-1216. (CVE-2006-6097)
    
      - Directory traversal vulnerability in the
        contains_dot_dot function in src/names.c in GNU tar
        allows user-assisted remote attackers to overwrite
        arbitrary files via certain //.. (slash slash dot dot)
        sequences in directory symlinks in a TAR archive.
        (CVE-2007-4131)
    
      - Buffer overflow in the safer_name_suffix function in GNU
        tar has unspecified attack vectors and impact, resulting
        in a crashing stack. (CVE-2007-4476)
    
      - Heap-based buffer overflow in the rmt_read__ function in
        lib/rtapelib.c in the rmt client functionality in GNU
        tar before 1.23 and GNU cpio before 2.11 allows remote
        rmt servers to cause a denial of service (memory
        corruption) or possibly execute arbitrary code by
        sending more data than was requested, related to archive
        filenames that contain a : (colon) character.
        (CVE-2010-0624)
    
      - Directory traversal vulnerability in the
        safer_name_suffix function in GNU tar 1.14 through 1.29
        might allow remote attackers to bypass an intended
        protection mechanism and write to arbitrary files via
        vectors related to improper sanitization of the
        file_name parameter, aka POINTYFEATHER. (CVE-2016-6321)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0089");
      script_set_attribute(attribute:"solution", value:
    "Upgrade the vulnerable CGSL tar packages. Note that updated packages may not be available yet. Please contact ZTE for
    more information.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2007-4476");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(119);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/02/24");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"NewStart CGSL Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/ZTE-CGSL/release");
    if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux");
    
    if (release !~ "CGSL MAIN 4.06")
      audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 4.06');
    
    if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu);
    
    flag = 0;
    
    pkgs = {
      "CGSL MAIN 4.06": [
        "tar-1.23-15.el6_8.cgslv4_6.0.1.gff7e116",
        "tar-debuginfo-1.23-15.el6_8.cgslv4_6.0.1.gff7e116"
      ]
    };
    pkg_list = pkgs[release];
    
    foreach (pkg in pkg_list)
      if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tar");
    }
    
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_X86_118192.NASL
    descriptionSunOS 5.9_x86: gtar patch. Date this patch was last updated by Sun : Apr/19/10
    last seen2020-06-01
    modified2020-06-02
    plugin id35001
    published2008-12-02
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35001
    titleSolaris 9 (x86) : 118192-05
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text in this plugin was
    # extracted from the Oracle SunOS Patch Updates.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(35001);
      script_version("1.14");
      script_cvs_date("Date: 2019/10/25 13:36:27");
    
      script_cve_id("CVE-2006-0300");
    
      script_name(english:"Solaris 9 (x86) : 118192-05");
      script_summary(english:"Check for patch 118192-05");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote host is missing Sun Security Patch number 118192-05"
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "SunOS 5.9_x86: gtar patch.
    Date this patch was last updated by Sun : Apr/19/10"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://getupdates.oracle.com/readme/118192-05"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"You should install this patch for your system to be up-to-date."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/04/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"Solaris Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Solaris/showrev");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("solaris.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    if (solaris_check_patch(release:"5.9_x86", arch:"i386", patch:"118192-05", obsoleted_by:"", package:"SUNWgtar", version:"11.9.0,REV=2002.03.02.00.30") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:solaris_get_report());
      else security_warning(0);
      exit(0);
    }
    audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-257-1.NASL
    descriptionJim Meyering discovered that tar did not properly verify the validity of certain header fields in a GNU tar archive. By tricking an user into processing a specially crafted tar archive, this could be exploited to execute arbitrary code with the privileges of the user. The tar version in Ubuntu 4.10 is not affected by this vulnerability. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21065
    published2006-03-13
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21065
    titleUbuntu 5.04 / 5.10 : tar vulnerability (USN-257-1)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-257-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21065);
      script_version("1.14");
      script_cvs_date("Date: 2019/08/02 13:33:00");
    
      script_cve_id("CVE-2006-0300");
      script_xref(name:"USN", value:"257-1");
    
      script_name(english:"Ubuntu 5.04 / 5.10 : tar vulnerability (USN-257-1)");
      script_summary(english:"Checks dpkg output for updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Ubuntu host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Jim Meyering discovered that tar did not properly verify the validity
    of certain header fields in a GNU tar archive. By tricking an user
    into processing a specially crafted tar archive, this could be
    exploited to execute arbitrary code with the privileges of the user.
    
    The tar version in Ubuntu 4.10 is not affected by this vulnerability.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected tar package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:tar");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:5.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:5.10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/02/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/03/13");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/02/22");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! ereg(pattern:"^(5\.04|5\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 5.04 / 5.10", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"5.04", pkgname:"tar", pkgver:"1.14-2ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"5.10", pkgname:"tar", pkgver:"1.15.1-2ubuntu0.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tar");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-046.NASL
    descriptionGnu tar versions 1.14 and above have a buffer overflow vulnerability and some other issues including : - Carefully crafted invalid headers can cause buffer overrun. - Invalid header fields go undiagnosed. - Some valid time strings are ignored. The updated packages have been patched to address this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id20964
    published2006-02-22
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20964
    titleMandrake Linux Security Advisory : tar (MDKSA-2006:046)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2007-004.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4 that does not have Security Update 2007-004 applied. This update fixes security flaws in the following applications : AFP Client AirPort CarbonCore diskdev_cmds fetchmail ftpd gnutar Help Viewer HID Family Installer Kerberos Libinfo Login Window network_cmds SMB System Configuration URLMount Video Conference WebDAV
    last seen2020-06-01
    modified2020-06-02
    plugin id25081
    published2007-04-21
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25081
    titleMac OS X Multiple Vulnerabilities (Security Update 2007-004)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_139099-07.NASL
    descriptionSunOS 5.10: gtar patch. Date this patch was last updated by Sun : Jul/16/18
    last seen2020-06-01
    modified2020-06-02
    plugin id111115
    published2018-07-17
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111115
    titleSolaris 10 (sparc) : 139099-07
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-987.NASL
    descriptionJim Meyering discovered several buffer overflows in GNU tar, which may lead to the execution of arbitrary code through specially crafted tar archives.
    last seen2020-06-01
    modified2020-06-02
    plugin id22853
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22853
    titleDebian DSA-987-1 : tar - buffer overflow
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_139100-04.NASL
    descriptionSunOS 5.10_x86: gtar patch. Date this patch was last updated by Sun : Apr/19/10
    last seen2020-06-01
    modified2020-06-02
    plugin id108007
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108007
    titleSolaris 10 (x86) : 139100-04
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_139100-07.NASL
    descriptionSunOS 5.10_x86: gtar patch. Date this patch was last updated by Sun : Jul/16/18
    last seen2020-06-01
    modified2020-06-02
    plugin id111125
    published2018-07-17
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111125
    titleSolaris 10 (x86) : 139100-07
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0232.NASL
    descriptionAn updated tar package that fixes a buffer overflow bug is now available for Red Hat Enterprise Linux 4. This update has been rated as having Moderate security impact by the Red Hat Security Response Team. The GNU tar program saves many files together in one archive and can restore individual files (or all of the files) from that archive. Jim Meyering discovered a buffer overflow bug in the way GNU tar extracts malformed archives. By tricking a user into extracting a malicious tar archive, it is possible to execute arbitrary code as the user running tar. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-0300 to this issue. Users of tar should upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21005
    published2006-03-06
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21005
    titleRHEL 4 : tar (RHSA-2006:0232)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS9_118191.NASL
    descriptionSunOS 5.9: gtar patch. Date this patch was last updated by Sun : Apr/19/10
    last seen2020-06-01
    modified2020-06-02
    plugin id34997
    published2008-12-02
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/34997
    titleSolaris 9 (sparc) : 118191-05
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2006-0232.NASL
    descriptionAn updated tar package that fixes a buffer overflow bug is now available for Red Hat Enterprise Linux 4. This update has been rated as having Moderate security impact by the Red Hat Security Response Team. The GNU tar program saves many files together in one archive and can restore individual files (or all of the files) from that archive. Jim Meyering discovered a buffer overflow bug in the way GNU tar extracts malformed archives. By tricking a user into extracting a malicious tar archive, it is possible to execute arbitrary code as the user running tar. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-0300 to this issue. Users of tar should upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21988
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21988
    titleCentOS 4 : tar (CESA-2006:0232)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200603-06.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200603-06 (GNU tar: Buffer overflow) Jim Meyering discovered a flaw in the handling of certain header fields that could result in a buffer overflow when extracting or listing the contents of an archive. Impact : A remote attacker could construct a malicious tar archive that could potentially execute arbitrary code with the privileges of the user running GNU tar. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21044
    published2006-03-13
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21044
    titleGLSA-200603-06 : GNU tar: Buffer overflow
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_139099.NASL
    descriptionSunOS 5.10: gtar patch. Date this patch was last updated by Sun : Apr/19/10 This plugin has been deprecated and either replaced with individual 139099 patch-revision plugins, or deemed non-security related.
    last seen2019-02-21
    modified2018-07-30
    plugin id34106
    published2008-09-08
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=34106
    titleSolaris 10 (sparc) : 139099-04 (deprecated)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_4_9.NASL
    descriptionThe remote host is running a version of Mac OS X 10.4 which is older than version 10.4.9 or a version of Mac OS X 10.3 which does not have Security Update 2007-003 applied. This update contains several security fixes for the following programs : - ColorSync - CoreGraphics - Crash Reporter - CUPS - Disk Images - DS Plugins - Flash Player - GNU Tar - HFS - HID Family - ImageIO - Kernel - MySQL server - Networking - OpenSSH - Printing - QuickDraw Manager - servermgrd - SMB File Server - Software Update - sudo - WebLog
    last seen2020-06-01
    modified2020-06-02
    plugin id24811
    published2007-03-13
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24811
    titleMac OS X < 10.4.9 Multiple Vulnerabilities (Security Update 2007-003)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0153_TAR.NASL
    descriptionThe remote NewStart CGSL host, running version MAIN 4.05, has tar packages installed that are affected by multiple vulnerabilities: - Buffer overflow in tar 1.14 through 1.15.90 allows user- assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers. (CVE-2006-0300) - GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216. (CVE-2006-6097) - Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive. (CVE-2007-4131) - Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a crashing stack. (CVE-2007-4476) - Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character. (CVE-2010-0624) - Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. (CVE-2016-6321) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127428
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127428
    titleNewStart CGSL MAIN 4.05 : tar Multiple Vulnerabilities (NS-SA-2019-0153)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_139100.NASL
    descriptionSunOS 5.10_x86: gtar patch. Date this patch was last updated by Sun : Apr/19/10 This plugin has been deprecated and either replaced with individual 139100 patch-revision plugins, or deemed non-security related.
    last seen2019-02-21
    modified2018-07-30
    plugin id34107
    published2008-09-08
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=34107
    titleSolaris 10 (x86) : 139100-04 (deprecated)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_6107EFB9AAE311DAAEA1000854D03344.NASL
    descriptionGNU tar is vulnerable to a buffer overflow, caused by improper bounds checking of the PAX extended headers. By tricking an user into processing a specially crafted tar archive, this could be exploited to execute arbitrary code with the privileges of the user.
    last seen2020-06-01
    modified2020-06-02
    plugin id21437
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21437
    titleFreeBSD : gtar -- invalid headers buffer overflow (6107efb9-aae3-11da-aea1-000854d03344)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_139099-04.NASL
    descriptionSunOS 5.10: gtar patch. Date this patch was last updated by Sun : Apr/19/10
    last seen2020-06-01
    modified2020-06-02
    plugin id107509
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107509
    titleSolaris 10 (sparc) : 139099-04

Oval

  • accepted2009-06-15T04:00:39.412-04:00
    classvulnerability
    contributors
    nameMichael Wood
    organizationHewlett-Packard
    definition_extensions
    commentSolaris 10 (x86) is installed
    ovaloval:org.mitre.oval:def:1926
    descriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    familyunix
    idoval:org.mitre.oval:def:5252
    statusaccepted
    submitted2009-04-30T11:23:00.000-04:00
    titleSecurity Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS)
    version35
  • accepted2009-06-15T04:00:53.458-04:00
    classvulnerability
    contributors
    nameMichael Wood
    organizationHewlett-Packard
    definition_extensions
    commentSolaris 10 (SPARC) is installed
    ovaloval:org.mitre.oval:def:1440
    descriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    familyunix
    idoval:org.mitre.oval:def:5978
    statusaccepted
    submitted2009-04-30T11:23:00.000-04:00
    titleSecurity Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS)
    version35
  • accepted2009-06-15T04:00:54.861-04:00
    classvulnerability
    contributors
    nameMichael Wood
    organizationHewlett-Packard
    definition_extensions
    commentSolaris 9 (SPARC) is installed
    ovaloval:org.mitre.oval:def:1457
    descriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    familyunix
    idoval:org.mitre.oval:def:5993
    statusaccepted
    submitted2009-04-30T11:23:00.000-04:00
    titleSecurity Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS)
    version36
  • accepted2009-06-15T04:01:00.185-04:00
    classvulnerability
    contributors
    nameMichael Wood
    organizationHewlett-Packard
    definition_extensions
    commentSolaris 9 (x86) is installed
    ovaloval:org.mitre.oval:def:1683
    descriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    familyunix
    idoval:org.mitre.oval:def:6094
    statusaccepted
    submitted2009-04-30T11:23:00.000-04:00
    titleSecurity Vulnerability in GNU tar May Lead to Arbitrary Code Execution or Denial of Service (DoS)
    version36
  • accepted2013-04-29T04:18:40.860-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    descriptionBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    familyunix
    idoval:org.mitre.oval:def:9295
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleBuffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    version26

Redhat

advisories
bugzilla
id181772
titleCVE-2006-0300 GNU tar heap overlfow bug
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • commenttar is earlier than 0:1.14-9.RHEL4
      ovaloval:com.redhat.rhsa:tst:20060232001
    • commenttar is signed with Red Hat master key
      ovaloval:com.redhat.rhsa:tst:20060232002
rhsa
idRHSA-2006:0232
released2006-03-01
severityModerate
titleRHSA-2006:0232: tar security update (Moderate)
rpms
  • tar-0:1.14-9.RHEL4
  • tar-debuginfo-0:1.14-9.RHEL4

References