CVE-2006-0300

Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305214
http://docs.info.apple.com/article.html?artnum=305391
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html
http://secunia.com/advisories/18973 Vendor Advisory
http://secunia.com/advisories/18976 Patch Vendor Advisory
http://secunia.com/advisories/18999 Patch Vendor Advisory
http://secunia.com/advisories/19016
http://secunia.com/advisories/19093
http://secunia.com/advisories/19130
http://secunia.com/advisories/19152
http://secunia.com/advisories/19236
http://secunia.com/advisories/20042
http://secunia.com/advisories/24479
http://secunia.com/advisories/24966
http://securityreason.com/securityalert/480
http://securityreason.com/securityalert/543
http://securitytracker.com/id?1015705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1
http://www.debian.org/security/2006/dsa-987
http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml
http://www.novell.com/linux/security/advisories/2006_05_sr.html
http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html
http://www.osvdb.org/23371 Patch
http://www.redhat.com/support/errata/RHSA-2006-0232.html
http://www.securityfocus.com/archive/1/430299/100/0/threaded
http://www.securityfocus.com/bid/16764
http://www.trustix.org/errata/2006/0010 Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0684
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1470
http://www.vupen.com/english/advisories/2008/2518
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24855
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295
https://usn.ubuntu.com/257-1/
http://docs.info.apple.com/article.html?artnum=305214
http://docs.info.apple.com/article.html?artnum=305391
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html
http://secunia.com/advisories/18973 Vendor Advisory
http://secunia.com/advisories/18976 Patch Vendor Advisory
http://secunia.com/advisories/18999 Patch Vendor Advisory
http://secunia.com/advisories/19016
http://secunia.com/advisories/19093
http://secunia.com/advisories/19130
http://secunia.com/advisories/19152
http://secunia.com/advisories/19236
http://secunia.com/advisories/20042
http://secunia.com/advisories/24479
http://secunia.com/advisories/24966
http://securityreason.com/securityalert/480
http://securityreason.com/securityalert/543
http://securitytracker.com/id?1015705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1
http://www.debian.org/security/2006/dsa-987
http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml
http://www.novell.com/linux/security/advisories/2006_05_sr.html
http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html
http://www.osvdb.org/23371 Patch
http://www.redhat.com/support/errata/RHSA-2006-0232.html
http://www.securityfocus.com/archive/1/430299/100/0/threaded
http://www.securityfocus.com/bid/16764
http://www.trustix.org/errata/2006/0010 Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0684
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1470
http://www.vupen.com/english/advisories/2008/2518
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24855
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295
https://usn.ubuntu.com/257-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:tar:1.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=305214 - () http://docs.info.apple.com/article.html?artnum=305214 -
References () http://docs.info.apple.com/article.html?artnum=305391 - () http://docs.info.apple.com/article.html?artnum=305391 -
References () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html -
References () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html -
References () http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html - () http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html -
References () http://secunia.com/advisories/18973 - Vendor Advisory () http://secunia.com/advisories/18973 - Vendor Advisory
References () http://secunia.com/advisories/18976 - Patch, Vendor Advisory () http://secunia.com/advisories/18976 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18999 - Patch, Vendor Advisory () http://secunia.com/advisories/18999 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19016 - () http://secunia.com/advisories/19016 -
References () http://secunia.com/advisories/19093 - () http://secunia.com/advisories/19093 -
References () http://secunia.com/advisories/19130 - () http://secunia.com/advisories/19130 -
References () http://secunia.com/advisories/19152 - () http://secunia.com/advisories/19152 -
References () http://secunia.com/advisories/19236 - () http://secunia.com/advisories/19236 -
References () http://secunia.com/advisories/20042 - () http://secunia.com/advisories/20042 -
References () http://secunia.com/advisories/24479 - () http://secunia.com/advisories/24479 -
References () http://secunia.com/advisories/24966 - () http://secunia.com/advisories/24966 -
References () http://securityreason.com/securityalert/480 - () http://securityreason.com/securityalert/480 -
References () http://securityreason.com/securityalert/543 - () http://securityreason.com/securityalert/543 -
References () http://securitytracker.com/id?1015705 - () http://securitytracker.com/id?1015705 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1 -
References () http://www.debian.org/security/2006/dsa-987 - () http://www.debian.org/security/2006/dsa-987 -
References () http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml - () http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml -
References () http://www.novell.com/linux/security/advisories/2006_05_sr.html - () http://www.novell.com/linux/security/advisories/2006_05_sr.html -
References () http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html - () http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html -
References () http://www.osvdb.org/23371 - Patch () http://www.osvdb.org/23371 - Patch
References () http://www.redhat.com/support/errata/RHSA-2006-0232.html - () http://www.redhat.com/support/errata/RHSA-2006-0232.html -
References () http://www.securityfocus.com/archive/1/430299/100/0/threaded - () http://www.securityfocus.com/archive/1/430299/100/0/threaded -
References () http://www.securityfocus.com/bid/16764 - () http://www.securityfocus.com/bid/16764 -
References () http://www.trustix.org/errata/2006/0010 - Vendor Advisory () http://www.trustix.org/errata/2006/0010 - Vendor Advisory
References () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/0684 - () http://www.vupen.com/english/advisories/2006/0684 -
References () http://www.vupen.com/english/advisories/2007/0930 - () http://www.vupen.com/english/advisories/2007/0930 -
References () http://www.vupen.com/english/advisories/2007/1470 - () http://www.vupen.com/english/advisories/2007/1470 -
References () http://www.vupen.com/english/advisories/2008/2518 - () http://www.vupen.com/english/advisories/2008/2518 -
References () http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046 - Patch, Vendor Advisory () http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24855 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24855 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295 -
References () https://usn.ubuntu.com/257-1/ - () https://usn.ubuntu.com/257-1/ -

Information

Published : 2006-02-24 00:02

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0300

Mitre link : CVE-2006-0300

CVE.ORG link : CVE-2006-0300


JSON object : View

Products Affected

gnu

  • tar