Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200612-10] Tar: Directory traversal vulnerability Vulnerability Scan
Vulnerability Scan Summary
Tar: Directory traversal vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200612-10
(Tar: Directory traversal vulnerability)
Tar does not properly extract archive elements using the GNUTYPE_NAMES
record name, allowing files to be created at arbitrary locations using
symlinks. Once a symlink is extracted, files after the symlink in the
archive will be extracted to the destination of the symlink.
A possible hacker could entice a user to extract a specially crafted tar
archive, possibly allowing for the overwriting of arbitrary files on
the system extracting the archive.
There is no known workaround at this time.
All Tar users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/tar-1.16-r2"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.