- EPSS 7.34%
- Published 24.11.2006 18:07:00
- Last modified 09.04.2025 00:30:58
GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function ...
CVE-2006-0300
- EPSS 18.81%
- Published 24.02.2006 00:02:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
CVE-2005-1918
- EPSS 2.06%
- Published 31.12.2005 05:00:00
- Last modified 03.04.2025 01:03:51
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probabl...
- EPSS 1.53%
- Published 10.08.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.
- EPSS 0.67%
- Published 28.10.2002 05:00:00
- Last modified 03.04.2025 01:03:51
GNU tar 1.13.19 and other versions before 1.13.25 allows remote attackers to overwrite arbitrary files via a symlink attack, as the result of a modification that effectively disabled the security check.
- EPSS 1.2%
- Published 10.10.2002 04:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leave...
CVE-2001-1267
- EPSS 0.13%
- Published 12.07.2001 04:00:00
- Last modified 03.04.2025 01:03:51
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).