Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html | Exploit Third Party Advisory VDB Entry |
| https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt | Third Party Advisory |
| http://www.securityfocus.com/bid/93937 | Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2016/Oct/96 | Mailing List Third Party Advisory |
| http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html | Mailing List Vendor Advisory |
| http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d | Issue Tracking Patch |
| http://seclists.org/fulldisclosure/2016/Oct/102 | Mailing List Patch Third Party Advisory |
| http://www.ubuntu.com/usn/USN-3132-1 | |
| http://www.debian.org/security/2016/dsa-3702 | |
| https://security.gentoo.org/glsa/201611-19 | |
| https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-12-09 22:59
Updated : 2021-06-29 15:15
NVD link : CVE-2016-6321
Mitre link : CVE-2016-6321
JSON object : View
Products Affected
gnu
- tar
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
