CVE-2005-1918

The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
http://secunia.com/advisories/18988 Patch Vendor Advisory
http://secunia.com/advisories/19130 Vendor Advisory
http://secunia.com/advisories/19183 Patch Vendor Advisory
http://secunia.com/advisories/20397 Vendor Advisory
http://securitytracker.com/id?1015655 Patch
http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
http://www.novell.com/linux/security/advisories/2006_05_sr.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0195.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/430297/100/0/threaded
http://www.securityfocus.com/bid/5834 Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
http://secunia.com/advisories/18988 Patch Vendor Advisory
http://secunia.com/advisories/19130 Vendor Advisory
http://secunia.com/advisories/19183 Patch Vendor Advisory
http://secunia.com/advisories/20397 Vendor Advisory
http://securitytracker.com/id?1015655 Patch
http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
http://www.novell.com/linux/security/advisories/2006_05_sr.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0195.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/430297/100/0/threaded
http://www.securityfocus.com/bid/5834 Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc -
References () http://secunia.com/advisories/18988 - Patch, Vendor Advisory () http://secunia.com/advisories/18988 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19130 - Vendor Advisory () http://secunia.com/advisories/19130 - Vendor Advisory
References () http://secunia.com/advisories/19183 - Patch, Vendor Advisory () http://secunia.com/advisories/19183 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20397 - Vendor Advisory () http://secunia.com/advisories/20397 - Vendor Advisory
References () http://securitytracker.com/id?1015655 - Patch () http://securitytracker.com/id?1015655 - Patch
References () http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm -
References () http://www.novell.com/linux/security/advisories/2006_05_sr.html - Vendor Advisory () http://www.novell.com/linux/security/advisories/2006_05_sr.html - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2006-0195.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0195.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/430297/100/0/threaded - () http://www.securityfocus.com/archive/1/430297/100/0/threaded -
References () http://www.securityfocus.com/bid/5834 - Patch () http://www.securityfocus.com/bid/5834 - Patch
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589 - () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946 -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-1918

Mitre link : CVE-2005-1918

CVE.ORG link : CVE-2005-1918


JSON object : View

Products Affected

redhat

  • linux_advanced_workstation
  • enterprise_linux
  • enterprise_linux_desktop

gnu

  • tar
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')