Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1418

Опубликовано: 10 окт. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-1418: libtar security update (MODERATE)

[1.2.11-17.el6_4.1]

  • fix CVE-2013-4397: buffer overflows by expanding a specially-crafted archive

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

libtar

1.2.11-17.el6_4.1

libtar-devel

1.2.11-17.el6_4.1

Oracle Linux i686

libtar

1.2.11-17.el6_4.1

libtar-devel

1.2.11-17.el6_4.1

Oracle Linux sparc64

libtar

1.2.11-17.el6_4.1

libtar-devel

1.2.11-17.el6_4.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 12 лет назад

Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.

redhat
почти 12 лет назад

Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.

nvd
почти 12 лет назад

Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.

debian
почти 12 лет назад

Multiple integer overflows in the th_read function in lib/block.c in l ...

github
больше 3 лет назад

Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.