Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://lists.feep.net:8080/pipermail/libtar/2013-October/000361.html | mailing list |
http://rhn.redhat.com/errata/RHSA-2013-1418.html | vendor advisory |
http://secunia.com/advisories/55253 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1029166 | vdb entry |
https://source.android.com/security/bulletin/2018-01-01 | |
http://www.openwall.com/lists/oss-security/2013/10/10/6 | mailing list |
http://secunia.com/advisories/55188 | third party advisory vendor advisory |
http://repo.or.cz/w/libtar.git/commitdiff/45448e8bae671c2f7e80b860ae0fc0cedf2bdc04 | patch exploit |
http://www.securitytracker.com/id/1040106 | vdb entry |
http://www.debian.org/security/2013/dsa-2817 | vendor advisory |
http://www.securityfocus.com/bid/62922 | vdb entry |
http://www.openwall.com/lists/oss-security/2013/10/10/4 | mailing list |