Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.info.apple.com/article.html?artnum=305214 - | |
References | () http://docs.info.apple.com/article.html?artnum=305391 - | |
References | () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - | |
References | () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html - | |
References | () http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html - | |
References | () http://secunia.com/advisories/18973 - Vendor Advisory | |
References | () http://secunia.com/advisories/18976 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18999 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/19016 - | |
References | () http://secunia.com/advisories/19093 - | |
References | () http://secunia.com/advisories/19130 - | |
References | () http://secunia.com/advisories/19152 - | |
References | () http://secunia.com/advisories/19236 - | |
References | () http://secunia.com/advisories/20042 - | |
References | () http://secunia.com/advisories/24479 - | |
References | () http://secunia.com/advisories/24966 - | |
References | () http://securityreason.com/securityalert/480 - | |
References | () http://securityreason.com/securityalert/543 - | |
References | () http://securitytracker.com/id?1015705 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1 - | |
References | () http://www.debian.org/security/2006/dsa-987 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml - | |
References | () http://www.novell.com/linux/security/advisories/2006_05_sr.html - | |
References | () http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html - | |
References | () http://www.osvdb.org/23371 - Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0232.html - | |
References | () http://www.securityfocus.com/archive/1/430299/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16764 - | |
References | () http://www.trustix.org/errata/2006/0010 - Vendor Advisory | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2006/0684 - | |
References | () http://www.vupen.com/english/advisories/2007/0930 - | |
References | () http://www.vupen.com/english/advisories/2007/1470 - | |
References | () http://www.vupen.com/english/advisories/2008/2518 - | |
References | () http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24855 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295 - | |
References | () https://usn.ubuntu.com/257-1/ - |
Information
Published : 2006-02-24 00:02
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0300
Mitre link : CVE-2006-0300
CVE.ORG link : CVE-2006-0300
JSON object : View
Products Affected
gnu
- tar
CWE