[<prev] [next>] [day] [month] [year] [list]
Message-ID: <456fa586.6BVDPdoZiyllr7wx%announce-noreply@rpath.com>
Date: Thu, 30 Nov 2006 22:46:14 -0500
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2006-0222-1 tar
rPath Security Advisory: 2006-0222-1
Published: 2006-11-30
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Indirect User Deterministic Vulnerability
Updated Versions:
tar=/conary.rpath.com@rpl:devel//1/1.15.1-7.1-1
References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097
https://issues.rpath.com/browse/RPL-821
Description:
Previous version of the tar package are vulnerable to an attack in
which unpacking an intentionally-malformed tar archive can overwrite
arbitrary files to which the user running tar has write access.
If the attacking user knows the name of a vulnerable binary file
and overwrites it, this allows the attacker to place arbitrary code
on the system which is likely to be run. If root is running tar,
this includes any file on the system, which would elevate this
to an indirect non-deterministic remote root unauthorized access
vulnerability.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists