CVE-2001-1267
CVSS2.1
发布时间 :2001-07-12 00:00:00
修订时间 :2008-09-05 16:26:06
NMCOS    

[原文]Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).


[CNNVD]GNU Tar敌对目标路径漏洞(CNNVD-200107-075)

        GNU tar 1.13.19及其早期版本存在目录遍历漏洞。本地用户可以在提取存档期间借助文件名包含..(点 点)的tar文件覆盖任意文件。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1267
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1267
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200107-075
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2002-096.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2002:096
http://online.securityfocus.com/archive/1/196445
(VENDOR_ADVISORY)  BUGTRAQ  20010712 SECURITY.NNOV: directory traversal and path globing in multiple archivers
http://www.securityfocus.com/bid/3024
(UNKNOWN)  BID  3024
http://www.redhat.com/support/errata/RHSA-2003-218.html
(UNKNOWN)  REDHAT  RHSA-2003:218
http://www.redhat.com/support/errata/RHSA-2002-138.html
(UNKNOWN)  REDHAT  RHSA-2002:138
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:066
(UNKNOWN)  MANDRAKE  MDKSA-2002:066
http://www.iss.net/security_center/static/10224.php
(VENDOR_ADVISORY)  XF  archive-extraction-directory-traversal(10224)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-47800-1
(UNKNOWN)  SUNALERT  47800
http://online.securityfocus.com/advisories/4514
(UNKNOWN)  HP  HPSBTL0209-068
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000538
(UNKNOWN)  CONECTIVA  CLA-2002:538
ftp://alpha.gnu.org/gnu/tar/tar-1.13.25.tar.gz
(UNKNOWN)  CONFIRM  ftp://alpha.gnu.org/gnu/tar/tar-1.13.25.tar.gz

- 漏洞信息

GNU Tar敌对目标路径漏洞
低危 路径遍历
2001-07-12 00:00:00 2007-08-28 00:00:00
远程  
        GNU tar 1.13.19及其早期版本存在目录遍历漏洞。本地用户可以在提取存档期间借助文件名包含..(点 点)的tar文件覆盖任意文件。

- 公告与补丁

        NOTE: Allot NetEnforcer includes a vulnerable version of GNU tar. The vendor has addressed this issue in NetEnforcer 4.2.4 by using GNU cpio instead. The vendor has also announced that Allot NetEnforcer will include updated tar packages as soon as GNU provides them.
        Please see the referenced advisories for more information.
        
        
        GNU tar 1.13
        
        GNU tar 1.13.11
        
        GNU tar 1.13.14
        
        GNU tar 1.13.16
        
        GNU tar 1.13.17
        
        GNU tar 1.13.18
        
        GNU tar 1.13.19
        
        GNU tar 1.13.5
        

- 漏洞信息

8967
GNU tar Double Dot Archive Extraction Arbitrary File Overwrite

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-07-02 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GNU Tar Hostile Destination Path Vulnerability
Access Validation Error 3024
Yes No
2001-07-12 12:00:00 2007-10-01 07:49:00
Reported by 3APA3A <3APA3A@security.nnov.ru>.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server SDK 9
SuSE SUSE Linux Enterprise Server 9 SP3
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 10 SP1
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise SDK 9
SuSE SUSE Linux Enterprise SDK 10.SP1
SuSE SUSE Linux Enterprise SDK 10
SuSE SUSE Linux Enterprise SDK 10
SuSE SUSE Linux Enterprise Desktop 10 SP1
SuSE SUSE Linux Enterprise Desktop 10
SuSE Linux Professional 10.2 x86_64
SuSE Linux Personal 10.2 x86_64
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. openSUSE 10.2
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Open-Enterprise-Server 0
S.u.S.E. Office Server
S.u.S.E. Novell Linux POS 9
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Novell Linux Desktop 9
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 10.2
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 10.2
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9-SP3
+ Linux kernel 2.6.5
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Enterprise Server 10.SP1
S.u.S.E. Linux Enterprise Server 10
+ Linux kernel 2.6.5
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Desktop 10
S.u.S.E. Linux 10.1 x86-64
S.u.S.E. Linux 10.1 x86
S.u.S.E. Linux 10.1 ppc
S.u.S.E. Linux 10.0 x86-64
S.u.S.E. Linux 10.0 x86
S.u.S.E. Linux 10.0 ppc
rPath rPath Linux 1
GNU tar 1.13.19
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Red Hat Linux 6.2
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ Sun Cobalt Qube 3
+ Sun Cobalt RaQ 3
+ Sun Cobalt RaQ 4
+ Sun Cobalt RaQ 550
+ Sun Cobalt RaQ XTR
+ Sun Linux 5.0.6
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
GNU tar 1.13.18
GNU tar 1.13.17
GNU tar 1.13.16
GNU tar 1.13.14
GNU tar 1.13.11
GNU tar 1.13.5
GNU tar 1.13
Foresight Linux Foresight Linux 1.1
Allot NetEnforcer 4.2.1
Allot NetEnforcer 4.2
GNU tar 1.13.25
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
+ HP Secure OS software for Linux 1.0
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 9.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ Sun Linux 5.0
Allot NetEnforcer 4.2.4

- 不受影响的程序版本

GNU tar 1.13.25
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
+ HP Secure OS software for Linux 1.0
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 9.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ Sun Linux 5.0
Allot NetEnforcer 4.2.4

- 漏洞讨论

GNU tar contains a vulnerability in the handling of pathnames for archived files.

By specifying a path for an archived item that points outside the expected directory scope, an attacker can cause the file to be extracted to arbitrary locations on the filesystem, including paths containing system binaries and other sensitive or confidential information.

By default, tar will overwrite existing files without warning the user. Since tar can override umask settings, the output file can be rendered executable.

An attacker can exploit this issue to create or overwrite binaries in any desired location. The attacker may be able to elevate privileges, potentially to 'root'.

Versions prior to GNU Tar 1.13.19 are affected.

- 漏洞利用

An exploit is not required.

- 解决方案

NOTE: Allot NetEnforcer includes a vulnerable version of GNU tar. The vendor has addressed this issue in NetEnforcer 4.2.4 by using GNU cpio instead. The vendor has also announced that Allot NetEnforcer will include updated tar packages as soon as GNU provides them.

Please see the referenced advisories for more information.


GNU tar 1.13

GNU tar 1.13.11

GNU tar 1.13.14

GNU tar 1.13.16

GNU tar 1.13.17

GNU tar 1.13.18

GNU tar 1.13.19

GNU tar 1.13.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站