CVE-2006-6097
Summary
| CVE | CVE-2006-6097 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-11-24 18:07:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216. |
Risk And Classification
Primary CVSS: v2.0 4 from [email protected]
AV:N/AC:H/Au:N/C:N/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
HighAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
PartialAV:N/AC:H/Au:N/C:N/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 216937 – CVE-2006-6097 GNU tar directory traversal | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Exploit |
| VMware ESX Server 2.5.4 Upgrade Patch 5 (for 2.5.4 Systems Only) | af854a3a-2127-422b-91ae-364da2661108 | www.vmware.com | |
| Gentoo Linux Documentation -- Tar: Directory traversal vulnerability | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| Gentoo update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityTracker.com Archives - GNU tar GNUTYPE_NAMES Record Directory Traversal Flaw May Let Remote Users Overwrite Arbitrary Files | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| OpenPKG Corporation: Security: Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.openpkg.com | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| SecurityReason - GNU tar directory traversal | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| APPLE-SA-2007-03-13 Mac OS X v10.4.9 and Security Update 2007-003 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| ASA-2007-015 (RHSA-2006-0749) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | |
| GNU Tar GNUTYPE_NAMES Remote Directory Traversal Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit |
| US-CERT Technical Cyber Security Alert TA07-072A -- Apple Updates for Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.us-cert.gov | US Government Resource |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Debian update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| GNU tar "GNUTYPES_NAMES" Record Type Security Issue - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| usn/usn-385-1 - Ubuntu: Linux for human beings | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| [Full-disclosure] GNU tar directory traversal | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | Exploit |
| Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| About the security content of Mac OS X 10.4.9 and Security Update 2007-003 | af854a3a-2127-422b-91ae-364da2661108 | docs.info.apple.com | |
| Slackware update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| VMware ESX Server Multiple Security Updates - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Red Hat update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| VMware Knowledge Base | af854a3a-2127-422b-91ae-364da2661108 | kb.vmware.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Mandriva update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| security.freebsd.org/advisories/FreeBSD-SA-06:26.gtar.asc | af854a3a-2127-422b-91ae-364da2661108 | security.freebsd.org | |
| patches.sgi.com/support/free/security/advisories/20061202-01-P.asc | af854a3a-2127-422b-91ae-364da2661108 | patches.sgi.com | |
| rPath update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Avaya Products tar "GNUTYPES_NAMES" Record Type Security Issue - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| issues.rpath.com/browse/RPL-821 | af854a3a-2127-422b-91ae-364da2661108 | issues.rpath.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Ubuntu update for tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Debian -- Security Information -- DSA-1223-1 tar | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| www.trustix.org/errata/2006/0068 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | |
| Trustix update for gnupg and tar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| FreeBSD update for gtar - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-03-14 | Mark J Cox | Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. |
There are currently no legacy QID mappings associated with this CVE.