Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2016.0386
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2016-0386)
Summary:The remote host is missing an update for the 'tar' package(s) announced via the MGASA-2016-0386 advisory.
Description:Summary:
The remote host is missing an update for the 'tar' package(s) announced via the MGASA-2016-0386 advisory.

Vulnerability Insight:
Harry Sintonen discovered that GNU tar does not properly handle member
names containing '..', thus allowing an attacker to bypass the path names
specified on the command line and replace files and directories in the
target directory (CVE-2016-6321).

Affected Software/OS:
'tar' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-6321
20161026 [CSS] POINTYFEATHER / tar extract pathname bypass (CVE-2016-6321)
http://seclists.org/fulldisclosure/2016/Oct/96
20161030 [CSS] POINTYFEATHER / tar extract pathname bypass (CVE-2016-6321) - patch update
http://seclists.org/fulldisclosure/2016/Oct/102
93937
http://www.securityfocus.com/bid/93937
DSA-3702
http://www.debian.org/security/2016/dsa-3702
GLSA-201611-19
https://security.gentoo.org/glsa/201611-19
USN-3132-1
http://www.ubuntu.com/usn/USN-3132-1
[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
[bug-tar] 20161029 Re: [Bug-tar] possible fixes for CVE-2016-6321
http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.