Описание
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-1918
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
- http://secunia.com/advisories/18988
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19183
- http://secunia.com/advisories/20397
- http://securitytracker.com/id?1015655
- http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.redhat.com/support/errata/RHSA-2006-0195.html
- http://www.securityfocus.com/archive/1/430297/100/0/threaded
- http://www.securityfocus.com/bid/5834
Связанные уязвимости
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
The original patch for a GNU tar directory traversal vulnerability (CV ...