Directory Traversal Affecting tar package, versions <1.14-2.2
Threat Intelligence
EPSS
0.11% (45th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-TAR-312301
- published 31 Dec 2005
- disclosed 31 Dec 2005
Introduced: 31 Dec 2005
CVE-2005-1918 Open this link in a new tabHow to fix?
Upgrade Debian:8
tar
to version 1.14-2.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tar
package and not the tar
package as distributed by Debian
.
See How to fix?
for Debian:8
relevant fixed versions and status.
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
References
- https://security-tracker.debian.org/tracker/CVE-2005-1918
- http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
- http://www.securityfocus.com/archive/1/430297/100/0/threaded
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
- http://securitytracker.com/id?1015655
- http://secunia.com/advisories/18988
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19183
- http://secunia.com/advisories/20397
- http://www.securityfocus.com/bid/5834
- ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.redhat.com/support/errata/RHSA-2006-0195.html
CVSS Scores
version 3.1