Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d - Issue Tracking, Patch | |
References | () http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html - Mailing List, Vendor Advisory | |
References | () http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/Oct/102 - Mailing List, Patch, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2016/Oct/96 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2016/dsa-3702 - | |
References | () http://www.securityfocus.com/bid/93937 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-3132-1 - | |
References | () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://security.gentoo.org/glsa/201611-19 - | |
References | () https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt - Third Party Advisory |
Information
Published : 2016-12-09 22:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6321
Mitre link : CVE-2016-6321
CVE.ORG link : CVE-2016-6321
JSON object : View
Products Affected
gnu
- tar
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')