|
Test ID: | 1.3.6.1.4.1.25623.1.0.891623 |
Category: | Debian Local Security Checks |
Title: | Debian LTS Advisory ([SECURITY] [DLA 1623-1] tar security update) |
Summary: | It was discovered that there was a potential denial of service;vulnerability in tar, the GNU version of the tar UNIX archiving;utility.;;The --sparse argument looped endlessly if the file shrank whilst;it was being read. Tar would only break out of this endless loop;if the file grew again to (or beyond) its original end of file. |
Description: | Summary: It was discovered that there was a potential denial of service vulnerability in tar, the GNU version of the tar UNIX archiving utility. The --sparse argument looped endlessly if the file shrank whilst it was being read. Tar would only break out of this endless loop if the file grew again to (or beyond) its original end of file. Vulnerability Insight: Tar is a program for packaging a set of files as a single archive in tar format. The function it performs is conceptually similar to cpio, and to things like PKZIP in the DOS world. It is heavily used by the Debian package management system, and is useful for performing system backups and exchanging sets of files with others. Affected Software/OS: tar on Debian Linux Solution: For Debian 8 'Jessie', this issue has been fixed in tar version 1.27.1-2+deb8u2. We recommend that you upgrade your tar packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-20482 |
Copyright | Copyright (c) 2019 Greenbone Networks GmbH http://greenbone.net |
This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|