ID CVE-2007-4476
Summary Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:tar:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.11.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.11.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.17:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:tar:1.18:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:tar:1.18:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-05-2021 - 19:55)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2014-01-20T04:01:32.472-05:00
    class vulnerability
    contributors
    • name Varun
      organization Hewlett-Packard
    • name Chris Coffin
      organization The MITRE Corporation
    definition_extensions
    comment VMware ESX Server 4.0 is installed
    oval oval:org.mitre.oval:def:6293
    description Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
    family unix
    id oval:org.mitre.oval:def:7114
    status accepted
    submitted 2010-10-01T16:37:39.000-05:00
    title VMware ESX,Service Console update for cpio and tar.
    version 7
  • accepted 2010-06-07T04:01:26.445-04:00
    class vulnerability
    contributors
    name Pai Peng
    organization Hewlett-Packard
    definition_extensions
    • comment Solaris 9 (SPARC) is installed
      oval oval:org.mitre.oval:def:1457
    • comment Solaris 10 (SPARC) is installed
      oval oval:org.mitre.oval:def:1440
    • comment Solaris 9 (x86) is installed
      oval oval:org.mitre.oval:def:1683
    • comment Solaris 10 (x86) is installed
      oval oval:org.mitre.oval:def:1926
    description Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
    family unix
    id oval:org.mitre.oval:def:8599
    status accepted
    submitted 2010-03-26T14:24:08.000-04:00
    title Security Vulnerabilities in GNU tar (see gtar(1)) May Lead to Files Being Overwritten, Execution of Arbitrary Code, or a Denial of Service (DoS)
    version 36
  • accepted 2013-04-29T04:18:52.299-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
    family unix
    id oval:org.mitre.oval:def:9336
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
    version 30
redhat via4
advisories
  • rhsa
    id RHSA-2010:0141
  • rhsa
    id RHSA-2010:0144
rpms
  • tar-0:1.14-13.el4_8.1
  • tar-2:1.15.1-23.0.1.el5_4.2
  • tar-debuginfo-0:1.14-13.el4_8.1
  • tar-debuginfo-2:1.15.1-23.0.1.el5_4.2
  • cpio-0:2.6-23.el5_4.1
  • cpio-debuginfo-0:2.6-23.el5_4.1
refmap via4
bid 26445
confirm
debian
  • DSA-1438
  • DSA-1566
fedora
  • FEDORA-2007-2673
  • FEDORA-2007-735
gentoo GLSA-200711-18
mandriva
  • MDKSA-2007:197
  • MDKSA-2007:233
secunia
  • 26674
  • 26987
  • 27331
  • 27453
  • 27514
  • 27681
  • 27857
  • 28255
  • 29968
  • 32051
  • 33567
  • 39008
sunalert 1021680
suse
  • SUSE-SR:2007:018
  • SUSE-SR:2007:019
ubuntu
  • USN-650-1
  • USN-709-1
vupen
  • ADV-2010-0628
  • ADV-2010-0629
statements via4
contributor Mark J Cox
lastmodified 2010-03-15
organization Red Hat
statement This issue was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2010-0141.html for tar. It did not affect the version of tar as shipped with Red Hat Enterprise Linux 3. This issue was also addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0144.html for cpio. It did not affect the version of cpio as shipped with Red Hat Enterprise Linux 3 and 4.
Last major update 17-05-2021 - 19:55
Published 05-09-2007 - 01:17
Last modified 17-05-2021 - 19:55
Back to Top