The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946 | signature vdb entry |
http://www.securityfocus.com/bid/5834 | patch vdb entry |
http://www.novell.com/linux/security/advisories/2006_05_sr.html | vendor advisory |
http://securitytracker.com/id?1015655 | patch vdb entry |
http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm | |
http://secunia.com/advisories/18988 | patch vendor advisory third party advisory |
http://secunia.com/advisories/19130 | third party advisory vendor advisory |
http://www.redhat.com/support/errata/RHSA-2006-0195.html | patch vendor advisory |
http://secunia.com/advisories/20397 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/430297/100/0/threaded | vendor advisory |
ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc | vendor advisory |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589 | |
http://secunia.com/advisories/19183 | patch vendor advisory third party advisory |