Summary
The remote host is missing an update to tar
announced via advisory DSA 1223-1.
Teemu Salmela discovered a vulnerability in GNU tar that could allow a malicious user to overwrite arbitrary files by inducing the victim to attempt to extract a specially crafted tar file containing a GNUTYPE_NAMES record with a symbolic link.
Solution
For the stable distribution (sarge), this problem has been fixed in version 1.14-2.3
For the unstable distribution (sid) and the forthcoming stable release (etch), this problem will be fixed in version 1.16-2.
We recommend that you upgrade your tar package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201223-1
Severity
Classification
-
CVE CVE-2006-6097 -
CVSS Base Score: 4.0
AV:N/AC:H/Au:N/C:N/I:P/A:P
Related Vulnerabilities