Summary
A directory traversal attack was reported against libtar, a C library for manipulating tar archives. The application does not validate the filenames inside the tar archive, allowing to extract files in arbitrary path. An attacker can craft a tar file to override files beyond the tar_extract_glob and tar_extract_all prefix parameter.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 1.2.11-6+deb6u2.
For the stable distribution (wheezy), this problem has been fixed in version 1.2.16-1+deb7u2.
For the unstable distribution (sid), this problem has been fixed in version 1.2.20-2.
We recommend that you upgrade your libtar packages.
Insight
libtar allows programs to create, extract and test tar archives.
It supports both the strict POSIX tar format and many of the commonly-used GNU extensions.
Affected
libtar on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4420 -
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:N/I:P/A:P
Related Vulnerabilities