Debian DSA-1223-1 : tar - input validation error

medium Nessus Plugin ID 23765

Synopsis

The remote Debian host is missing a security-related update.

Description

Teemu Salmela discovered a vulnerability in GNU tar that could allow a malicious user to overwrite arbitrary files by inducing the victim to attempt to extract a specially crafted tar file containing a GNUTYPE_NAMES record with a symbolic link.

Solution

Upgrade the tar package.

For the stable distribution (sarge), this problem has been fixed in version 1.14-2.3.

See Also

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399845

http://www.debian.org/security/2006/dsa-1223

Plugin Details

Severity: Medium

ID: 23765

File Name: debian_DSA-1223.nasl

Version: 1.19

Type: local

Agent: unix

Published: 12/4/2006

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tar, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/1/2006

Vulnerability Publication Date: 11/21/2006

Reference Information

CVE: CVE-2006-6097

BID: 21235

DSA: 1223