中危 GNU Tar 1.1x - GNUTYPE_NAMES Directory Traversal

CVE编号

CVE-2006-6097

利用情况

POC 已公开

补丁情况

没有补丁

披露时间

2006-11-25
漏洞描述
gnutar1.16和1.1.15,以及可能的其他版本,允许用户协助攻击者通过tar文件覆盖任意文件,tar文件包含带有符号链接的GnutType_name记录,该链接在Manglec的Extract_archive函数和CVE-2002-1216的一个变体中没有正确处理。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://docs.info.apple.com/article.html?artnum=305214
http://kb.vmware.com/KanisaPlatform/Publishing/817/2240267_f.SAL_Public.html
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050812.html
http://rhn.redhat.com/errata/RHSA-2006-0749.html
http://secunia.com/advisories/23115
http://secunia.com/advisories/23117
http://secunia.com/advisories/23142
http://secunia.com/advisories/23146
http://secunia.com/advisories/23163
http://secunia.com/advisories/23173
http://secunia.com/advisories/23198
http://secunia.com/advisories/23209
http://secunia.com/advisories/23314
http://secunia.com/advisories/23443
http://secunia.com/advisories/23514
http://secunia.com/advisories/23911
http://secunia.com/advisories/24479
http://secunia.com/advisories/24636
http://security.freebsd.org/advisories/FreeBSD-SA-06:26.gtar.asc
http://security.gentoo.org/glsa/glsa-200612-10.xml
http://securityreason.com/securityalert/1918
http://securitytracker.com/id?1017423
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackw...
http://support.avaya.com/elmodocs2/security/ASA-2007-015.htm
http://www.debian.org/security/2006/dsa-1223
http://www.mandriva.com/security/advisories?name=MDKSA-2006:219
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.038.html
http://www.securityfocus.com/archive/1/453286/100/0/threaded
http://www.securityfocus.com/archive/1/464268/100/0/threaded
http://www.securityfocus.com/bid/21235
http://www.trustix.org/errata/2006/0068/
http://www.ubuntu.com/usn/usn-385-1
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html
http://www.vupen.com/english/advisories/2006/4717
http://www.vupen.com/english/advisories/2006/5102
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1171
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=216937
https://issues.rpath.com/browse/RPL-821
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 gnu tar 1.15.1 -
运行在以下环境
应用 gnu tar 1.16 -
运行在以下环境
系统 debian_10 tar * Up to
(excluding)
1.16-2
运行在以下环境
系统 debian_11 tar * Up to
(excluding)
1.16-2
运行在以下环境
系统 debian_12 tar * Up to
(excluding)
1.16-2
运行在以下环境
系统 debian_3.1 tar * Up to
(excluding)
1.14-2.3
运行在以下环境
系统 suse_11 tar * Up to
(excluding)
1.20-23.23
阿里云评分
5.2
  • 攻击路径
    远程
  • 攻击复杂度
    困难
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    没有补丁
  • 数据保密性
    无影响
  • 数据完整性
    传输被破坏
  • 服务器危害
    DoS
  • 全网数量
    N/A
CWE-ID 漏洞类型
NVD-CWE-Other
阿里云安全产品覆盖情况