Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-4131 (GCVE-0-2007-4131)
Vulnerability from cvelistv5 – Published: 2007-08-25 00:00 – Updated: 2024-08-07 14:46- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:46:38.940Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1018599",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018599"
},
{
"name": "1021680",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"name": "26673",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26673"
},
{
"name": "26822",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26822"
},
{
"name": "ADV-2007-4238",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "TA07-352A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "26655",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26655"
},
{
"name": "27453",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27453"
},
{
"name": "FEDORA-2007-2673",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
},
{
"name": "28136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28136"
},
{
"name": "26781",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26781"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"name": "DSA-1438",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"name": "26590",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26590"
},
{
"name": "oval:org.mitre.oval:def:10420",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"name": "27861",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27861"
},
{
"name": "ADV-2007-2958",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"name": "MDKSA-2007:173",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"name": "FreeBSD-SA-07:10",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"name": "26984",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26984"
},
{
"name": "20070827 FLEA-2007-0049-1 tar",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"name": "2007-0026",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "APPLE-SA-2007-12-17",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name": "SUSE-SR:2007:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"name": "26604",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26604"
},
{
"name": "USN-506-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"name": "28255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28255"
},
{
"name": "26573",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26573"
},
{
"name": "RHSA-2007:0860",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "26603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26603"
},
{
"name": "oval:org.mitre.oval:def:7779",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"name": "25417",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25417"
},
{
"name": "GLSA-200709-09",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"name": "20070825 rPSA-2007-0172-1 tar",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"name": "26674",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26674"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-08-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-15T20:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "1018599",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018599"
},
{
"name": "1021680",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"name": "26673",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26673"
},
{
"name": "26822",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26822"
},
{
"name": "ADV-2007-4238",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "TA07-352A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "26655",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26655"
},
{
"name": "27453",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27453"
},
{
"name": "FEDORA-2007-2673",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
},
{
"name": "28136",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28136"
},
{
"name": "26781",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26781"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"name": "DSA-1438",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"name": "26590",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26590"
},
{
"name": "oval:org.mitre.oval:def:10420",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"name": "27861",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27861"
},
{
"name": "ADV-2007-2958",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"name": "MDKSA-2007:173",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"name": "FreeBSD-SA-07:10",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"name": "26984",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26984"
},
{
"name": "20070827 FLEA-2007-0049-1 tar",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"name": "2007-0026",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "APPLE-SA-2007-12-17",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name": "SUSE-SR:2007:018",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"name": "26604",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26604"
},
{
"name": "USN-506-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"name": "28255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28255"
},
{
"name": "26573",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26573"
},
{
"name": "RHSA-2007:0860",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "26603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26603"
},
{
"name": "oval:org.mitre.oval:def:7779",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"name": "25417",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25417"
},
{
"name": "GLSA-200709-09",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"name": "20070825 rPSA-2007-0172-1 tar",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"name": "26674",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26674"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-4131",
"datePublished": "2007-08-25T00:00:00.000Z",
"dateReserved": "2007-08-02T00:00:00.000Z",
"dateUpdated": "2024-08-07T14:46:38.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-4131",
"date": "2026-05-22",
"epss": "0.11443",
"percentile": "0.93689"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*\", \"matchCriteriaId\": \"49EF5B77-9BC9-4AE8-A677-48E5E576BE63\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:4.0:*:desktop:*:*:*:*:*\", \"matchCriteriaId\": \"3499D0E2-C80B-4B91-8843-8EC3C22E8BC4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*\", \"matchCriteriaId\": \"36389D32-61C1-4487-8399-FA7D2864FACD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*\", \"matchCriteriaId\": \"49B67F74-AF8F-4A27-AA8A-A8479E256A9F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*\", \"matchCriteriaId\": \"40D71CBC-D365-4710-BAB5-8A1159F35E41\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*\", \"matchCriteriaId\": \"13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1FA7050-9C48-490C-974E-BBED58A70E9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BCC81C4-718C-4D1C-9C0B-A49B6986D9EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"504BA480-EF7F-4604-A9D4-50C6C8576D1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2095CF90-0433-4F9A-A5F5-74A5C401E703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"322AD74F-6976-4261-9609-5678293B1FDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"471DDE51-BE1B-48D1-AC07-D8CE971F0F9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FAAF649-BE68-47E2-BD25-EF9DF9B26655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F94C4466-E3D2-4275-86A8-5D180F493B04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60CD7558-833D-473B-99A4-854FB6CC6C9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B87C1F89-63A8-4955-9C42-3B49EC1C1C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E3F6678-D645-4614-8C57-2833BE8BE77E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FE339D0-D585-440D-8BD4-5183833258F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8B4A20D-AAD0-4857-AC0F-D221EBB08BFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9B46F22-B0FB-4F99-B44E-D34E0DD5D194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D8F228C-6DED-42A2-BE9B-944171EAC10C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B6D83BA-6C85-43F3-87FD-A77CC6F1D21A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de salto de directorio en la funci\\u00f3n contains_dot_dot de src/names.c en GNU tar permite a atacantes remotos con la complicidad del usuario sobre-escribir ficheros de su elecci\\u00f3n mediante determinadas secuencias //.. (barra barra punto punto) en los enlaces simb\\u00f3licos de directorio en un fichero TAR.\"}]",
"id": "CVE-2007-4131",
"lastModified": "2024-11-21T00:34:51.430",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-08-25T00:17:00.000",
"references": "[{\"url\": \"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=307179\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26573\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26590\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26603\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26604\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26655\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26673\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26674\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26781\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26822\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26984\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27453\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27861\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28136\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28255\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200709-09.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1438\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:173\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_18_sr.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0860.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/477731/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/477865/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/25417\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1018599\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.trustix.org/errata/2007/0026/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-506-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2958\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4238\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1631\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=307179\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26573\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26590\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26603\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26604\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26655\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26673\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26674\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26781\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26822\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26984\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27861\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28136\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28255\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200709-09.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1438\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:173\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_18_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0860.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/477731/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/477865/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/25417\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018599\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.trustix.org/errata/2007/0026/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-506-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2958\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/4238\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-1631\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-4131\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-08-25T00:17:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en la funci\u00f3n contains_dot_dot de src/names.c en GNU tar permite a atacantes remotos con la complicidad del usuario sobre-escribir ficheros de su elecci\u00f3n mediante determinadas secuencias //.. (barra barra punto punto) en los enlaces simb\u00f3licos de directorio en un fichero TAR.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*\",\"matchCriteriaId\":\"49EF5B77-9BC9-4AE8-A677-48E5E576BE63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:desktop:*:*:*:*:*\",\"matchCriteriaId\":\"3499D0E2-C80B-4B91-8843-8EC3C22E8BC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*\",\"matchCriteriaId\":\"36389D32-61C1-4487-8399-FA7D2864FACD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*\",\"matchCriteriaId\":\"49B67F74-AF8F-4A27-AA8A-A8479E256A9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*\",\"matchCriteriaId\":\"40D71CBC-D365-4710-BAB5-8A1159F35E41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*\",\"matchCriteriaId\":\"13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FA7050-9C48-490C-974E-BBED58A70E9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BCC81C4-718C-4D1C-9C0B-A49B6986D9EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"504BA480-EF7F-4604-A9D4-50C6C8576D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2095CF90-0433-4F9A-A5F5-74A5C401E703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"322AD74F-6976-4261-9609-5678293B1FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"471DDE51-BE1B-48D1-AC07-D8CE971F0F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FAAF649-BE68-47E2-BD25-EF9DF9B26655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F94C4466-E3D2-4275-86A8-5D180F493B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CD7558-833D-473B-99A4-854FB6CC6C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B87C1F89-63A8-4955-9C42-3B49EC1C1C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E3F6678-D645-4614-8C57-2833BE8BE77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE339D0-D585-440D-8BD4-5183833258F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8B4A20D-AAD0-4857-AC0F-D221EBB08BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B46F22-B0FB-4F99-B44E-D34E0DD5D194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8F228C-6DED-42A2-BE9B-944171EAC10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6D83BA-6C85-43F3-87FD-A77CC6F1D21A\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307179\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26573\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26590\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26603\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26604\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26655\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26673\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26674\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26781\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26822\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26984\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27453\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27861\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28136\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28255\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-09.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1438\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:173\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_18_sr.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0860.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/477731/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/477865/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/25417\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1018599\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.trustix.org/errata/2007/0026/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-506-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2958\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/4238\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26573\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26590\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26673\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26674\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26781\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26984\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-09.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:173\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_18_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0860.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/477731/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/477865/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/25417\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018599\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.trustix.org/errata/2007/0026/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-506-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2958\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/4238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-377
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité de GNU tar permet de contourner la politique de sécurité.
Description
Un manque de vérification de certains attributs d'une archive tar permet à un utilisateur malveillant d'extraire des fichiers ou des dossiers contenus dans l'archive vers des emplacements arbitraires. Un utilisateur exploitant cette vulnérabilité peut contourner la politique de sécurité en créant ou en écrasant des données sensibles.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | OpenSolaris sur x86 de svn_01 à svn_11. | ||
| N/A | N/A | Solaris 10 sur SPARC sans le patch 139099-03 ; | ||
| N/A | N/A | OpenSolaris sur SPARC de svn_01 à svn _115 ; | ||
| N/A | N/A | GNU tar versions antérieures à 1.18 ; | ||
| N/A | N/A | Solaris 9 sur SPARC ; | ||
| N/A | N/A | Solaris 9 sur x86 ; | ||
| N/A | N/A | Solaris 10 sur x86 sans le patch 139100-03 ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenSolaris sur x86 de svn_01 \u00e0 svn_11.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 10 sur SPARC sans le patch 139099-03 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "OpenSolaris sur SPARC de svn_01 \u00e0 svn _115 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GNU tar versions ant\u00e9rieures \u00e0 1.18 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 9 sur SPARC ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 9 sur x86 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 10 sur x86 sans le patch 139100-03 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn manque de v\u00e9rification de certains attributs d\u0027une archive tar permet\n\u00e0 un utilisateur malveillant d\u0027extraire des fichiers ou des dossiers\ncontenus dans l\u0027archive vers des emplacements arbitraires. Un\nutilisateur exploitant cette vuln\u00e9rabilit\u00e9 peut contourner la politique\nde s\u00e9curit\u00e9 en cr\u00e9ant ou en \u00e9crasant des donn\u00e9es sensibles.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:173 du 4 septembre 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200709-09 du 15 septembre 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-09.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0860 du 23 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0860.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-506-1 du 28 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:018 du 31 ao\u00fbt 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1438 du 28 d\u00e9cembre 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1438"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Sun 1-66-273551-1 du 2 d\u00e9cembre 2009 :",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273551-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-383 du 26 septembre 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-07:10.gtar du 29 novembre 2007 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:10.gtar.asc"
}
],
"reference": "CERTA-2007-AVI-377",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-24T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Debian, Mandriva, SuSE, Ubuntu, FreeBSD et Avaya.",
"revision_date": "2008-10-07T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences au bulletin de s\u00e9curit\u00e9 Sun 1-66-273551-1 du 02 d\u00e9cembre 2009.",
"revision_date": "2009-12-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de GNU tar permet de contourner la politique de\ns\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans GNU tar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007:0860 du 23 ao\u00fbt 2007",
"url": null
}
]
}
CERTA-2007-AVI-551
Vulnerability from certfr_avis - Published: - Updated:None
Description
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation Apple Mac OS X. L'exploitation de ces vulnérabilités permettent à une personne malveillante d'exécuter diverses actions dont l'exécution de code arbitraire à distance, l'atteinte à l'intégrité des données, l'élévation de privilèges ou le contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X version 10.5.1 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s\npermettent \u00e0 une personne malveillante d\u0027ex\u00e9cuter diverses actions dont\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance, l\u0027atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es, l\u0027\u00e9l\u00e9vation de privil\u00e8ges ou le contournement de la politique\nde s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-4710",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4710"
},
{
"name": "CVE-2007-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1661"
},
{
"name": "CVE-2007-5857",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5857"
},
{
"name": "CVE-2007-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4351"
},
{
"name": "CVE-2007-4768",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4768"
},
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"name": "CVE-2007-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5851"
},
{
"name": "CVE-2007-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1659"
},
{
"name": "CVE-2007-5476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5476"
},
{
"name": "CVE-2007-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3876"
},
{
"name": "CVE-2007-4708",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4708"
},
{
"name": "CVE-2007-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5853"
},
{
"name": "CVE-2007-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5398"
},
{
"name": "CVE-2007-1218",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1218"
},
{
"name": "CVE-2007-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5848"
},
{
"name": "CVE-2007-5770",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5770"
},
{
"name": "CVE-2007-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1662"
},
{
"name": "CVE-2007-4709",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4709"
},
{
"name": "CVE-2007-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5863"
},
{
"name": "CVE-2007-3798",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3798"
},
{
"name": "CVE-2006-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0024"
},
{
"name": "CVE-2007-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5849"
},
{
"name": "CVE-2007-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5858"
},
{
"name": "CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
},
{
"name": "CVE-2007-6165",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6165"
},
{
"name": "CVE-2007-4572",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4572"
},
{
"name": "CVE-2007-5855",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5855"
},
{
"name": "CVE-2007-5854",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5854"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2007-5856",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5856"
},
{
"name": "CVE-2007-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5850"
},
{
"name": "CVE-2007-5859",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5859"
},
{
"name": "CVE-2007-5861",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5861"
},
{
"name": "CVE-2007-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5860"
},
{
"name": "CVE-2007-4767",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4767"
},
{
"name": "CVE-2007-4766",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4766"
},
{
"name": "CVE-2007-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5847"
}
],
"links": [],
"reference": "CERTA-2007-AVI-551",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307179 du 12 d\u00e9cembre 2007",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
}
]
}
CERTA-2007-AVI-377
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité de GNU tar permet de contourner la politique de sécurité.
Description
Un manque de vérification de certains attributs d'une archive tar permet à un utilisateur malveillant d'extraire des fichiers ou des dossiers contenus dans l'archive vers des emplacements arbitraires. Un utilisateur exploitant cette vulnérabilité peut contourner la politique de sécurité en créant ou en écrasant des données sensibles.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | OpenSolaris sur x86 de svn_01 à svn_11. | ||
| N/A | N/A | Solaris 10 sur SPARC sans le patch 139099-03 ; | ||
| N/A | N/A | OpenSolaris sur SPARC de svn_01 à svn _115 ; | ||
| N/A | N/A | GNU tar versions antérieures à 1.18 ; | ||
| N/A | N/A | Solaris 9 sur SPARC ; | ||
| N/A | N/A | Solaris 9 sur x86 ; | ||
| N/A | N/A | Solaris 10 sur x86 sans le patch 139100-03 ; |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OpenSolaris sur x86 de svn_01 \u00e0 svn_11.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 10 sur SPARC sans le patch 139099-03 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "OpenSolaris sur SPARC de svn_01 \u00e0 svn _115 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GNU tar versions ant\u00e9rieures \u00e0 1.18 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 9 sur SPARC ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 9 sur x86 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Solaris 10 sur x86 sans le patch 139100-03 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn manque de v\u00e9rification de certains attributs d\u0027une archive tar permet\n\u00e0 un utilisateur malveillant d\u0027extraire des fichiers ou des dossiers\ncontenus dans l\u0027archive vers des emplacements arbitraires. Un\nutilisateur exploitant cette vuln\u00e9rabilit\u00e9 peut contourner la politique\nde s\u00e9curit\u00e9 en cr\u00e9ant ou en \u00e9crasant des donn\u00e9es sensibles.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:173 du 4 septembre 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200709-09 du 15 septembre 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200709-09.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0860 du 23 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0860.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-506-1 du 28 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2007:018 du 31 ao\u00fbt 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1438 du 28 d\u00e9cembre 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1438"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Sun 1-66-273551-1 du 2 d\u00e9cembre 2009 :",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273551-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2007-383 du 26 septembre 2007 :",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-07:10.gtar du 29 novembre 2007 :",
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-07:10.gtar.asc"
}
],
"reference": "CERTA-2007-AVI-377",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-24T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo, Debian, Mandriva, SuSE, Ubuntu, FreeBSD et Avaya.",
"revision_date": "2008-10-07T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences au bulletin de s\u00e9curit\u00e9 Sun 1-66-273551-1 du 02 d\u00e9cembre 2009.",
"revision_date": "2009-12-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 de GNU tar permet de contourner la politique de\ns\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans GNU tar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2007:0860 du 23 ao\u00fbt 2007",
"url": null
}
]
}
CERTA-2007-AVI-551
Vulnerability from certfr_avis - Published: - Updated:None
Description
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation Apple Mac OS X. L'exploitation de ces vulnérabilités permettent à une personne malveillante d'exécuter diverses actions dont l'exécution de code arbitraire à distance, l'atteinte à l'intégrité des données, l'élévation de privilèges ou le contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X version 10.5.1 et ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 et ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s\npermettent \u00e0 une personne malveillante d\u0027ex\u00e9cuter diverses actions dont\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance, l\u0027atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es, l\u0027\u00e9l\u00e9vation de privil\u00e8ges ou le contournement de la politique\nde s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-4710",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4710"
},
{
"name": "CVE-2007-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1661"
},
{
"name": "CVE-2007-5857",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5857"
},
{
"name": "CVE-2007-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4351"
},
{
"name": "CVE-2007-4768",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4768"
},
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"name": "CVE-2007-5851",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5851"
},
{
"name": "CVE-2007-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1659"
},
{
"name": "CVE-2007-5476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5476"
},
{
"name": "CVE-2007-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3876"
},
{
"name": "CVE-2007-4708",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4708"
},
{
"name": "CVE-2007-5853",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5853"
},
{
"name": "CVE-2007-5398",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5398"
},
{
"name": "CVE-2007-1218",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1218"
},
{
"name": "CVE-2007-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5848"
},
{
"name": "CVE-2007-5770",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5770"
},
{
"name": "CVE-2007-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1662"
},
{
"name": "CVE-2007-4709",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4709"
},
{
"name": "CVE-2007-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5863"
},
{
"name": "CVE-2007-3798",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3798"
},
{
"name": "CVE-2006-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0024"
},
{
"name": "CVE-2007-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5849"
},
{
"name": "CVE-2007-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5858"
},
{
"name": "CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
},
{
"name": "CVE-2007-6165",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6165"
},
{
"name": "CVE-2007-4572",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4572"
},
{
"name": "CVE-2007-5855",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5855"
},
{
"name": "CVE-2007-5854",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5854"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
},
{
"name": "CVE-2007-5856",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5856"
},
{
"name": "CVE-2007-5850",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5850"
},
{
"name": "CVE-2007-5859",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5859"
},
{
"name": "CVE-2007-5861",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5861"
},
{
"name": "CVE-2007-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5860"
},
{
"name": "CVE-2007-4767",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4767"
},
{
"name": "CVE-2007-4766",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4766"
},
{
"name": "CVE-2007-5847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5847"
}
],
"links": [],
"reference": "CERTA-2007-AVI-551",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-12-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple 307179 du 12 d\u00e9cembre 2007",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
}
]
}
FKIE_CVE-2007-4131
Vulnerability from fkie_nvd - Published: 2007-08-25 00:17 - Updated: 2026-04-23 00:35| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921 | ||
| secalert@redhat.com | http://docs.info.apple.com/article.html?artnum=307179 | ||
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | ||
| secalert@redhat.com | http://secunia.com/advisories/26573 | ||
| secalert@redhat.com | http://secunia.com/advisories/26590 | ||
| secalert@redhat.com | http://secunia.com/advisories/26603 | ||
| secalert@redhat.com | http://secunia.com/advisories/26604 | ||
| secalert@redhat.com | http://secunia.com/advisories/26655 | ||
| secalert@redhat.com | http://secunia.com/advisories/26673 | ||
| secalert@redhat.com | http://secunia.com/advisories/26674 | ||
| secalert@redhat.com | http://secunia.com/advisories/26781 | ||
| secalert@redhat.com | http://secunia.com/advisories/26822 | ||
| secalert@redhat.com | http://secunia.com/advisories/26984 | ||
| secalert@redhat.com | http://secunia.com/advisories/27453 | ||
| secalert@redhat.com | http://secunia.com/advisories/27861 | ||
| secalert@redhat.com | http://secunia.com/advisories/28136 | ||
| secalert@redhat.com | http://secunia.com/advisories/28255 | ||
| secalert@redhat.com | http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200709-09.xml | ||
| secalert@redhat.com | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1 | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm | ||
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1438 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:173 | ||
| secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_18_sr.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0860.html | Patch | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/477731/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/477865/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/25417 | ||
| secalert@redhat.com | http://www.securitytracker.com/id?1018599 | ||
| secalert@redhat.com | http://www.trustix.org/errata/2007/0026/ | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-506-1 | ||
| secalert@redhat.com | http://www.us-cert.gov/cas/techalerts/TA07-352A.html | US Government Resource | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/2958 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/4238 | ||
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-1631 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779 | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=307179 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26573 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26590 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26603 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26604 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26655 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26673 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26674 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26781 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26822 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26984 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27453 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27861 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28136 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28255 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200709-09.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1438 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:173 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_18_sr.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0860.html | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/477731/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/477865/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25417 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018599 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0026/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-506-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-352A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2958 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/4238 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1631 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_linux | 5.0 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| rpath | rpath_linux | 1 | |
| gnu | tar | 1.13 | |
| gnu | tar | 1.13.5 | |
| gnu | tar | 1.13.11 | |
| gnu | tar | 1.13.14 | |
| gnu | tar | 1.13.16 | |
| gnu | tar | 1.13.17 | |
| gnu | tar | 1.13.18 | |
| gnu | tar | 1.13.19 | |
| gnu | tar | 1.13.25 | |
| gnu | tar | 1.14 | |
| gnu | tar | 1.14.90 | |
| gnu | tar | 1.15 | |
| gnu | tar | 1.15.1 | |
| gnu | tar | 1.15.90 | |
| gnu | tar | 1.15.91 | |
| gnu | tar | 1.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*",
"matchCriteriaId": "49EF5B77-9BC9-4AE8-A677-48E5E576BE63",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:desktop:*:*:*:*:*",
"matchCriteriaId": "3499D0E2-C80B-4B91-8843-8EC3C22E8BC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*",
"matchCriteriaId": "36389D32-61C1-4487-8399-FA7D2864FACD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*",
"matchCriteriaId": "49B67F74-AF8F-4A27-AA8A-A8479E256A9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
"matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*",
"matchCriteriaId": "13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FA7050-9C48-490C-974E-BBED58A70E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1BCC81C4-718C-4D1C-9C0B-A49B6986D9EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*",
"matchCriteriaId": "504BA480-EF7F-4604-A9D4-50C6C8576D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2095CF90-0433-4F9A-A5F5-74A5C401E703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*",
"matchCriteriaId": "322AD74F-6976-4261-9609-5678293B1FDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*",
"matchCriteriaId": "471DDE51-BE1B-48D1-AC07-D8CE971F0F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAAF649-BE68-47E2-BD25-EF9DF9B26655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F94C4466-E3D2-4275-86A8-5D180F493B04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*",
"matchCriteriaId": "60CD7558-833D-473B-99A4-854FB6CC6C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B87C1F89-63A8-4955-9C42-3B49EC1C1C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*",
"matchCriteriaId": "9E3F6678-D645-4614-8C57-2833BE8BE77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE339D0-D585-440D-8BD4-5183833258F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B4A20D-AAD0-4857-AC0F-D221EBB08BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B46F22-B0FB-4F99-B44E-D34E0DD5D194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8F228C-6DED-42A2-BE9B-944171EAC10C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6D83BA-6C85-43F3-87FD-A77CC6F1D21A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en la funci\u00f3n contains_dot_dot de src/names.c en GNU tar permite a atacantes remotos con la complicidad del usuario sobre-escribir ficheros de su elecci\u00f3n mediante determinadas secuencias //.. (barra barra punto punto) en los enlaces simb\u00f3licos de directorio en un fichero TAR."
}
],
"id": "CVE-2007-4131",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-08-25T00:17:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"source": "secalert@redhat.com",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26573"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26590"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26603"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26604"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26655"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26673"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26674"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26781"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26822"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26984"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27453"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27861"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28136"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28255"
},
{
"source": "secalert@redhat.com",
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/25417"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securitytracker.com/id?1018599"
},
{
"source": "secalert@redhat.com",
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"source": "secalert@redhat.com",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26573"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26590"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26655"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26674"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26781"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26822"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26984"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27453"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/25417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018599"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-43W6-Q9MV-9CWF
Vulnerability from github – Published: 2022-05-01 18:20 – Updated: 2025-04-09 03:45Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
{
"affected": [],
"aliases": [
"CVE-2007-4131"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-08-25T00:17:00Z",
"severity": "MODERATE"
},
"details": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.",
"id": "GHSA-43w6-q9mv-9cwf",
"modified": "2025-04-09T03:45:33Z",
"published": "2022-05-01T18:20:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4131"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
},
{
"type": "WEB",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26573"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26590"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26603"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26604"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26655"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26673"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26674"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26781"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26822"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26984"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27453"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27861"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28136"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28255"
},
{
"type": "WEB",
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/25417"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1018599"
},
{
"type": "WEB",
"url": "http://www.trustix.org/errata/2007/0026"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/4238"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2007-4131
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-4131",
"description": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.",
"id": "GSD-2007-4131",
"references": [
"https://www.suse.com/security/cve/CVE-2007-4131.html",
"https://www.debian.org/security/2007/dsa-1438",
"https://access.redhat.com/errata/RHSA-2007:0860",
"https://linux.oracle.com/cve/CVE-2007-4131.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-4131"
],
"details": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.",
"id": "GSD-2007-4131",
"modified": "2023-12-13T01:21:36.655001Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-4131",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/26822",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26822"
},
{
"name": "http://www.trustix.org/errata/2007/0026/",
"refsource": "MISC",
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307179",
"refsource": "MISC",
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name": "http://secunia.com/advisories/26573",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26573"
},
{
"name": "http://secunia.com/advisories/26590",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26590"
},
{
"name": "http://secunia.com/advisories/26603",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26603"
},
{
"name": "http://secunia.com/advisories/26604",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26604"
},
{
"name": "http://secunia.com/advisories/26655",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26655"
},
{
"name": "http://secunia.com/advisories/26673",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26673"
},
{
"name": "http://secunia.com/advisories/26674",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26674"
},
{
"name": "http://secunia.com/advisories/26781",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26781"
},
{
"name": "http://secunia.com/advisories/26984",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26984"
},
{
"name": "http://secunia.com/advisories/27453",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27453"
},
{
"name": "http://secunia.com/advisories/27861",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27861"
},
{
"name": "http://secunia.com/advisories/28136",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28136"
},
{
"name": "http://secunia.com/advisories/28255",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28255"
},
{
"name": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc",
"refsource": "MISC",
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200709-09.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1",
"refsource": "MISC",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"name": "http://www.debian.org/security/2007/dsa-1438",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"name": "http://www.novell.com/linux/security/advisories/2007_18_sr.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0860.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"name": "http://www.securityfocus.com/archive/1/477731/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/477865/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/bid/25417",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/25417"
},
{
"name": "http://www.securitytracker.com/id?1018599",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1018599"
},
{
"name": "http://www.ubuntu.com/usn/usn-506-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"name": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
"refsource": "MISC",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "http://www.vupen.com/english/advisories/2007/2958",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"name": "http://www.vupen.com/english/advisories/2007/4238",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "https://issues.rpath.com/browse/RPL-1631",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:desktop:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-4131"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921",
"refsource": "MISC",
"tags": [],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921"
},
{
"name": "RHSA-2007:0860",
"refsource": "REDHAT",
"tags": [
"Patch"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0860.html"
},
{
"name": "25417",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/25417"
},
{
"name": "https://issues.rpath.com/browse/RPL-1631",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1631"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-383.htm"
},
{
"name": "FEDORA-2007-2673",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html"
},
{
"name": "FreeBSD-SA-07:10",
"refsource": "FREEBSD",
"tags": [],
"url": "http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc"
},
{
"name": "GLSA-200709-09",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200709-09.xml"
},
{
"name": "MDKSA-2007:173",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:173"
},
{
"name": "SUSE-SR:2007:018",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
},
{
"name": "2007-0026",
"refsource": "TRUSTIX",
"tags": [],
"url": "http://www.trustix.org/errata/2007/0026/"
},
{
"name": "USN-506-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-506-1"
},
{
"name": "1018599",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1018599"
},
{
"name": "26573",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26573"
},
{
"name": "26590",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26590"
},
{
"name": "26604",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26604"
},
{
"name": "26603",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26603"
},
{
"name": "26674",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26674"
},
{
"name": "26673",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26673"
},
{
"name": "26655",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26655"
},
{
"name": "26781",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26781"
},
{
"name": "26822",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26822"
},
{
"name": "26984",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26984"
},
{
"name": "27453",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27453"
},
{
"name": "27861",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27861"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=307179",
"refsource": "CONFIRM",
"tags": [],
"url": "http://docs.info.apple.com/article.html?artnum=307179"
},
{
"name": "APPLE-SA-2007-12-17",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
},
{
"name": "DSA-1438",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2007/dsa-1438"
},
{
"name": "TA07-352A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
},
{
"name": "28136",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28136"
},
{
"name": "28255",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28255"
},
{
"name": "1021680",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1"
},
{
"name": "ADV-2007-4238",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/4238"
},
{
"name": "ADV-2007-2958",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/2958"
},
{
"name": "oval:org.mitre.oval:def:7779",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7779"
},
{
"name": "oval:org.mitre.oval:def:10420",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10420"
},
{
"name": "20070827 FLEA-2007-0049-1 tar",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
},
{
"name": "20070825 rPSA-2007-0172-1 tar",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-15T21:33Z",
"publishedDate": "2007-08-25T00:17Z"
}
}
}
RHSA-2007:0860
Vulnerability from csaf_redhat - Published: 2007-08-23 12:41 - Updated: 2026-01-13 20:57Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2007:0860 | self |
| http://www.redhat.com/security/updates/classifica… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=251921 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2007-4131 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=251921 | external |
| https://www.cve.org/CVERecord?id=CVE-2007-4131 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2007-4131 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tar package that fixes a path traversal flaw is now available.\n\nThis update has been rated as having moderate security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU tar program saves many files together in one archive and can\nrestore individual files (or all of the files) from that archive. \n\nA path traversal flaw was discovered in the way GNU tar extracted archives.\nA malicious user could create a tar archive that could write to arbitrary\nfiles to which the user running GNU tar had write access. (CVE-2007-4131)\n\nRed Hat would like to thank Dmitry V. Levin for reporting this issue.\n\nUsers of tar should upgrade to this updated package, which contains a\nreplacement backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0860",
"url": "https://access.redhat.com/errata/RHSA-2007:0860"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "251921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251921"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0860.json"
}
],
"title": "Red Hat Security Advisory: tar security update",
"tracking": {
"current_release_date": "2026-01-13T20:57:59+00:00",
"generator": {
"date": "2026-01-13T20:57:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2007:0860",
"initial_release_date": "2007-08-23T12:41:00+00:00",
"revision_history": [
{
"date": "2007-08-23T12:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T19:44:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T20:57:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product_id": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.ia64",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64",
"product_id": "tar-2:1.15.1-23.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=ia64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product_id": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product_id": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.i386",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386",
"product_id": "tar-0:1.14-12.5.1.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.i386",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.i386",
"product_id": "tar-2:1.15.1-23.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=i386\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.src",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.src",
"product_id": "tar-0:1.14-12.5.1.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=src"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.src",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.src",
"product_id": "tar-2:1.15.1-23.0.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product_id": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.ppc",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc",
"product_id": "tar-2:1.15.1-23.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=ppc\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product_id": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.s390x",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x",
"product_id": "tar-2:1.15.1-23.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.s390",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390",
"product_id": "tar-0:1.14-12.5.1.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.src"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.src"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dmitry V. Levin"
]
}
],
"cve": "CVE-2007-4131",
"discovery_date": "2007-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "251921"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar directory traversal vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:tar-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-0:1.14-12.5.1.RHEL4.src",
"4AS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.src",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-0:1.14-12.5.1.RHEL4.src",
"4ES:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-0:1.14-12.5.1.RHEL4.src",
"4WS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"5Client:tar-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-2:1.15.1-23.0.1.el5.src",
"5Client:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-2:1.15.1-23.0.1.el5.src",
"5Server:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4131"
},
{
"category": "external",
"summary": "RHBZ#251921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4131"
}
],
"release_date": "2007-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-23T12:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:tar-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-0:1.14-12.5.1.RHEL4.src",
"4AS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.src",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-0:1.14-12.5.1.RHEL4.src",
"4ES:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-0:1.14-12.5.1.RHEL4.src",
"4WS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"5Client:tar-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-2:1.15.1-23.0.1.el5.src",
"5Client:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-2:1.15.1-23.0.1.el5.src",
"5Server:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0860"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar directory traversal vulnerability"
}
]
}
RHSA-2007_0860
Vulnerability from csaf_redhat - Published: 2007-08-23 12:41 - Updated: 2024-11-22 01:22Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2007:0860 | self |
| http://www.redhat.com/security/updates/classifica… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=251921 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2007-4131 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=251921 | external |
| https://www.cve.org/CVERecord?id=CVE-2007-4131 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2007-4131 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tar package that fixes a path traversal flaw is now available.\n\nThis update has been rated as having moderate security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU tar program saves many files together in one archive and can\nrestore individual files (or all of the files) from that archive. \n\nA path traversal flaw was discovered in the way GNU tar extracted archives.\nA malicious user could create a tar archive that could write to arbitrary\nfiles to which the user running GNU tar had write access. (CVE-2007-4131)\n\nRed Hat would like to thank Dmitry V. Levin for reporting this issue.\n\nUsers of tar should upgrade to this updated package, which contains a\nreplacement backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0860",
"url": "https://access.redhat.com/errata/RHSA-2007:0860"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "251921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251921"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0860.json"
}
],
"title": "Red Hat Security Advisory: tar security update",
"tracking": {
"current_release_date": "2024-11-22T01:22:29+00:00",
"generator": {
"date": "2024-11-22T01:22:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0860",
"initial_release_date": "2007-08-23T12:41:00+00:00",
"revision_history": [
{
"date": "2007-08-23T12:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T19:44:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:22:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product_id": "tar-0:1.14-12.5.1.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.ia64",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64",
"product_id": "tar-2:1.15.1-23.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=ia64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product_id": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product_id": "tar-2:1.15.1-23.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.i386",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386",
"product_id": "tar-0:1.14-12.5.1.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.i386",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.i386",
"product_id": "tar-2:1.15.1-23.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=i386\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.src",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.src",
"product_id": "tar-0:1.14-12.5.1.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=src"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.src",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.src",
"product_id": "tar-2:1.15.1-23.0.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product_id": "tar-0:1.14-12.5.1.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.ppc",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc",
"product_id": "tar-2:1.15.1-23.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=ppc\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product_id": "tar-0:1.14-12.5.1.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tar-2:1.15.1-23.0.1.el5.s390x",
"product": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x",
"product_id": "tar-2:1.15.1-23.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.15.1-23.0.1.el5?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product_id": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.15.1-23.0.1.el5?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product_id": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar-debuginfo@1.14-12.5.1.RHEL4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tar-0:1.14-12.5.1.RHEL4.s390",
"product": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390",
"product_id": "tar-0:1.14-12.5.1.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tar@1.14-12.5.1.RHEL4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.src"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64"
},
"product_reference": "tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.src"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.src"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
},
"product_reference": "tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Dmitry V. Levin"
]
}
],
"cve": "CVE-2007-4131",
"discovery_date": "2007-08-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "251921"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tar directory traversal vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:tar-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-0:1.14-12.5.1.RHEL4.src",
"4AS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.src",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-0:1.14-12.5.1.RHEL4.src",
"4ES:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-0:1.14-12.5.1.RHEL4.src",
"4WS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"5Client:tar-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-2:1.15.1-23.0.1.el5.src",
"5Client:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-2:1.15.1-23.0.1.el5.src",
"5Server:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4131"
},
{
"category": "external",
"summary": "RHBZ#251921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4131",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4131"
}
],
"release_date": "2007-08-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-23T12:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:tar-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-0:1.14-12.5.1.RHEL4.src",
"4AS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4AS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.src",
"4Desktop:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4Desktop:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-0:1.14-12.5.1.RHEL4.src",
"4ES:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4ES:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-0:1.14-12.5.1.RHEL4.src",
"4WS:tar-0:1.14-12.5.1.RHEL4.x86_64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.i386",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ia64",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.ppc",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.s390x",
"4WS:tar-debuginfo-0:1.14-12.5.1.RHEL4.x86_64",
"5Client:tar-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-2:1.15.1-23.0.1.el5.src",
"5Client:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Client:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-2:1.15.1-23.0.1.el5.src",
"5Server:tar-2:1.15.1-23.0.1.el5.x86_64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.i386",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ia64",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.ppc",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.s390x",
"5Server:tar-debuginfo-2:1.15.1-23.0.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0860"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tar directory traversal vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.