CVE-2006-6097
Summary
| CVE | CVE-2006-6097 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-11-24 18:07:00 UTC |
| Updated | 2018-10-17 21:46:00 UTC |
| Description | GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| FreeBSD update for gtar - Advisories - Secunia | SECUNIA | secunia.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| VMware ESX Server 2.5.4 Upgrade Patch 5 (for 2.5.4 Systems Only) | CONFIRM | www.vmware.com | |
| 2006-0068 | TRUSTIX | www.trustix.org | |
| [Full-disclosure] GNU tar directory traversal | FULLDISC | lists.grok.org.uk | Exploit |
| SecurityReason - GNU tar directory traversal | SREASON | securityreason.com | |
| FreeBSD-SA-06:26 | FREEBSD | security.freebsd.org | |
| About the security content of Mac OS X 10.4.9 and Security Update 2007-003 | CONFIRM | docs.info.apple.com | |
| SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia | SECUNIA | secunia.com | |
| 20061202-01-P | SGI | patches.sgi.com | |
| Trustix update for gnupg and tar - Advisories - Secunia | SECUNIA | secunia.com | |
| issues.rpath.com/browse/RPL-821 | CONFIRM | issues.rpath.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| APPLE-SA-2007-03-13 Mac OS X v10.4.9 and Security Update 2007-003 | APPLE | lists.apple.com | |
| Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | |
| Ubuntu update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| Mandriva update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| SecurityTracker.com Archives - GNU tar GNUTYPE_NAMES Record Directory Traversal Flaw May Let Remote Users Overwrite Arbitrary Files | SECTRACK | securitytracker.com | |
| US-CERT Technical Cyber Security Alert TA07-072A -- Apple Updates for Multiple Vulnerabilities | CERT | www.us-cert.gov | US Government Resource |
| Red Hat update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Slackware update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| GNU Tar GNUTYPE_NAMES Remote Directory Traversal Vulnerability | BID | www.securityfocus.com | Exploit |
| Debian update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| Avaya Products tar "GNUTYPES_NAMES" Record Type Security Issue - Advisories - Secunia | SECUNIA | secunia.com | |
| usn/usn-385-1 - Ubuntu: Linux for human beings | UBUNTU | www.ubuntu.com | |
| Gentoo Linux Documentation -- Tar: Directory traversal vulnerability | GENTOO | security.gentoo.org | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| 216937 – CVE-2006-6097 GNU tar directory traversal | MISC | bugzilla.redhat.com | Exploit |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| ASA-2007-015 (RHSA-2006-0749) | CONFIRM | support.avaya.com | |
| VMware Knowledge Base | CONFIRM | kb.vmware.com | |
| GNU tar "GNUTYPES_NAMES" Record Type Security Issue - Advisories - Secunia | SECUNIA | secunia.com | |
| OpenPKG Corporation: Security: Security Advisories | OPENPKG | www.openpkg.com | |
| Gentoo update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| The Slackware Linux Project: Slackware Security Advisories | SLACKWARE | slackware.com | |
| VMware ESX Server Multiple Security Updates - Advisories - Secunia | SECUNIA | secunia.com | |
| Debian -- Security Information -- DSA-1223-1 tar | DEBIAN | www.debian.org | |
| rPath update for tar - Advisories - Secunia | SECUNIA | secunia.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| rhn.redhat.com | Red Hat Support | REDHAT | rhn.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.