Gnu

Tar

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 06.04.2026 15:17:27
  • Zuletzt bearbeitet 22.04.2026 20:08:59

A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allo...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 11.07.2025 00:00:00
  • Zuletzt bearbeitet 02.11.2025 01:15:32

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extrac...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2024 04:15:08
  • Zuletzt bearbeitet 04.11.2025 19:15:55

In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 30.01.2023 04:15:08
  • Zuletzt bearbeitet 27.03.2025 21:15:40

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archiv...

  • EPSS 0.07%
  • Veröffentlicht 26.03.2021 17:15:12
  • Zuletzt bearbeitet 05.05.2025 14:15:04

A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.

  • EPSS 0.4%
  • Veröffentlicht 22.03.2019 08:29:00
  • Zuletzt bearbeitet 06.08.2025 22:15:28

pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 26.12.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:34

GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archive...

Exploit
  • EPSS 11.14%
  • Veröffentlicht 09.12.2016 22:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the ...

Exploit
  • EPSS 1.47%
  • Veröffentlicht 15.03.2010 13:28:25
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arb...

  • EPSS 12.22%
  • Veröffentlicht 05.09.2007 01:17:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."