lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 8 Dec 2006 17:40:43 +0100
From: OpenPKG GmbH <openpkg-noreply@...npkg.com>
To: bugtraq@...urityfocus.com
Subject: [OpenPKG-SA-2006.038] OpenPKG Security Advisory (tar)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________

Publisher Name:          OpenPKG GmbH
Publisher Home:          http://openpkg.com/

Advisory Id (public):    OpenPKG-SA-2006.038
Advisory Type:           OpenPKG Security Advisory (SA)
Advisory Directory:      http://openpkg.com/go/OpenPKG-SA
Advisory Document:       http://openpkg.com/go/OpenPKG-SA-2006.038
Advisory Published:      2006-12-08 17:40 UTC

Issue Id (internal):     OpenPKG-SI-20061127.01
Issue First Created:     2006-11-27
Issue Last Modified:     2006-12-08
Issue Revision:          06
____________________________________________________________________________

Subject Name:            GNU tar
Subject Summary:         archive format utility
Subject Home:            http://www.gnu.org/software/tar/
Subject Versions:        * <= 1.16

Vulnerability Id:        CVE-2006-6097, CVE-2002-1216
Vulnerability Scope:     global (not OpenPKG specific)

Attack Feasibility:      run-time
Attack Vector:           remote network
Attack Impact:           manipulation of data

Description:
    The archive format utility GNU tar [0], versions up to and including
    1.16, allows user-assisted attackers to overwrite arbitrary files
    via a TAR format file that contains a "GNUTYPE_NAMES" record with
    a symbolic link. As the "GNUTYPE_NAMES" based "name mangling"
    functionality in TAR format files is (1) a GNU extension only, (2)
    is no longer supported for TAR file creation by GNU tar since a
    longer time and (3) the extraction of such records is too dangerous,
    the functionality has been deactivated by default now in OpenPKG.
    For backward compatibility (usually to extract already existing
    older TAR format files), the introduced command-line option
    "--allow-name-mangling" is available.

References:
    [0] http://www.gnu.org/software/tar/
____________________________________________________________________________

Primary Package Name:    tar
Primary Package Home:    http://openpkg.org/go/package/tar

Corrected Distribution:  Corrected Series: Corrected Package:
OpenPKG Enterprise       E1.0-SOLID        openpkg-E1.0.1-E1.0.1
OpenPKG Enterprise       E1.0-SOLID        tar-1.16-E1.0.1
____________________________________________________________________________

For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <http://openpkg.com/>

iD8DBQFFeZV7ZwQuyWG3rjQRAr7lAKChzCKzzeu/QT8iblYoviwrDV+Q2ACfZSuO
a0HDAcNbCfdO/JTuWrfz23w=
=ZBTt
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ