ID CVE-2013-4397
Summary Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux 6.0
    cpe:2.3:o:redhat:enterprise_linux:6.0
  • Feep Libtar 1.2.11
    cpe:2.3:a:feep:libtar:1.2.11
  • Feep Libtar 1.2.13
    cpe:2.3:a:feep:libtar:1.2.13
  • Feep Libtar 1.2.14
    cpe:2.3:a:feep:libtar:1.2.14
  • Feep Libtar 1.2.15
    cpe:2.3:a:feep:libtar:1.2.15
  • Feep Libtar 1.2.16
    cpe:2.3:a:feep:libtar:1.2.16
  • Feep Libtar 1.2.17
    cpe:2.3:a:feep:libtar:1.2.17
  • Feep Libtar 1.2.18
    cpe:2.3:a:feep:libtar:1.2.18
  • Feep Libtar 1.2.19
    cpe:2.3:a:feep:libtar:1.2.19
CVSS
Base: 6.8 (as of 18-10-2013 - 12:51)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-18785.NASL
    description fix CVE-2013-4397: buffer overflows by expanding a specially crafted archive Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 70511
    published 2013-10-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70511
    title Fedora 18 : libtar-1.2.11-25.fc18 (2013-18785)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-18808.NASL
    description fix CVE-2013-4397: buffer overflows by expanding a specially crafted archive Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 70529
    published 2013-10-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70529
    title Fedora 19 : libtar-1.2.11-26.fc19 (2013-18808)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20131010_LIBTAR_ON_SL6_X.NASL
    description Two heap-based buffer overflow flaws were found in the way libtar handled certain archives. If a user were tricked into expanding a specially- crafted archive, it could cause the libtar executable or an application using libtar to crash or, potentially, execute arbitrary code. (CVE-2013-4397) Note: This issue only affected 32-bit builds of libtar.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 70394
    published 2013-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70394
    title Scientific Linux Security Update : libtar on SL6.x i386/x86_64
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2013-253.NASL
    description Updated libtar packages fixes security vulnerability : Two heap-based buffer overflow flaws were found in the way libtar handled certain archives. If a user were tricked into expanding a specially crafted archive, it could cause the libtar executable or an application using libtar to crash or, potentially, execute arbitrary code (CVE-2013-4397).
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 70520
    published 2013-10-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70520
    title Mandriva Linux Security Advisory : libtar (MDVSA-2013:253)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201402-19.NASL
    description The remote host is affected by the vulnerability described in GLSA-201402-19 (libtar: Arbitraty code execution) An integer overflow error within the “th_read()” function when processing long names or link extensions can be exploited to cause a heap-based buffer overflow via a specially crafted archive. Impact : A remote attacker could entice a user to open a specially crafted file using a program linked against libtar, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 72633
    published 2014-02-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72633
    title GLSA-201402-19 : libtar: Arbitraty code execution
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-1418.NASL
    description From Red Hat Security Advisory 2013:1418 : An updated libtar package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libtar package contains a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions. Two heap-based buffer overflow flaws were found in the way libtar handled certain archives. If a user were tricked into expanding a specially crafted archive, it could cause the libtar executable or an application using libtar to crash or, potentially, execute arbitrary code. (CVE-2013-4397) Note: This issue only affected 32-bit builds of libtar. Red Hat would like to thank Timo Warns for reporting this issue. All libtar users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 70386
    published 2013-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70386
    title Oracle Linux 6 : libtar (ELSA-2013-1418)
  • NASL family F5 Networks Local Security Checks
    NASL id F5_BIGIP_SOL16015326.NASL
    description Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow. (CVE-2013-4397)
    last seen 2019-02-21
    modified 2019-01-04
    plugin id 88582
    published 2016-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88582
    title F5 Networks BIG-IP : libtar vulnerability (K16015326)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2817.NASL
    description Timo Warns reported multiple integer overflow vulnerabilities in libtar, a library for manipulating tar archives, which can result in the execution of arbitrary code.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 71442
    published 2013-12-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=71442
    title Debian DSA-2817-1 : libtar - Integer overflow
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-1418.NASL
    description An updated libtar package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libtar package contains a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions. Two heap-based buffer overflow flaws were found in the way libtar handled certain archives. If a user were tricked into expanding a specially crafted archive, it could cause the libtar executable or an application using libtar to crash or, potentially, execute arbitrary code. (CVE-2013-4397) Note: This issue only affected 32-bit builds of libtar. Red Hat would like to thank Timo Warns for reporting this issue. All libtar users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70387
    published 2013-10-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70387
    title RHEL 6 : libtar (RHSA-2013:1418)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2013-18877.NASL
    description fix CVE-2013-4397: buffer overflows by expanding a specially crafted archive Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-19
    plugin id 70816
    published 2013-11-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70816
    title Fedora 20 : libtar-1.2.11-27.fc20 (2013-18877)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-1418.NASL
    description An updated libtar package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The libtar package contains a C library for manipulating tar archives. The library supports both the strict POSIX tar format and many of the commonly used GNU extensions. Two heap-based buffer overflow flaws were found in the way libtar handled certain archives. If a user were tricked into expanding a specially crafted archive, it could cause the libtar executable or an application using libtar to crash or, potentially, execute arbitrary code. (CVE-2013-4397) Note: This issue only affected 32-bit builds of libtar. Red Hat would like to thank Timo Warns for reporting this issue. All libtar users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 70400
    published 2013-10-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70400
    title CentOS 6 : libtar (CESA-2013:1418)
redhat via4
advisories
bugzilla
id 1014492
title CVE-2013-4397 libtar: Heap-based buffer overflows by expanding a specially-crafted archive
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhsa:tst:20100842001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhsa:tst:20100842002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhsa:tst:20100842003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhsa:tst:20100842004
  • OR
    • AND
      • comment libtar is earlier than 0:1.2.11-17.el6_4.1
        oval oval:com.redhat.rhsa:tst:20131418005
      • comment libtar is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20131418006
    • AND
      • comment libtar-devel is earlier than 0:1.2.11-17.el6_4.1
        oval oval:com.redhat.rhsa:tst:20131418007
      • comment libtar-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20131418008
rhsa
id RHSA-2013:1418
released 2013-10-10
severity Moderate
title RHSA-2013:1418: libtar security update (Moderate)
rpms
  • libtar-0:1.2.11-17.el6_4.1
  • libtar-devel-0:1.2.11-17.el6_4.1
refmap via4
bid 62922
confirm
debian DSA-2817
mlist
  • [libtar] 20131009 ANNOUNCE: libtar version 1.2.20
  • [oss-security] 20131010 Integer overflow in libtar (<= 1.2.19)
  • [oss-security] 20131010 Re: Integer overflow in libtar (<= 1.2.19)
sectrack
  • 1029166
  • 1040106
secunia
  • 55188
  • 55253
Last major update 19-12-2013 - 23:36
Published 17-10-2013 - 19:55
Last modified 22-04-2019 - 13:48
Back to Top