int(3381)

Vulnerability Bulletins


Path transversal en GNU tar

Vulnerability classification

Property Value
Confidence level Oficial
Impact Integridad
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software GNU Tar

Description

Se ha descubierto una vulnerabilidad en GNU tar. La vulnerabilidad reside en un salto de directorios cuando GNU tar extrae archivos.

Un atacante podría crear un archivo tar que sobrescribiese archivos a los cuales tuviese acceso de escritura el usuario con el que corre GNU tar.

Solution



Actualización de software.

Red Hat (RHSA-2007:0860-2)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux.

Mandriva (MDKSA-2007:173)

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/tar-1.15.91-1.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/tar-1.15.91-1.2mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/tar-1.15.91-1.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/tar-1.15.91-1.2mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/tar-1.15.1-5.3.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/tar-1.15.1-5.3.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/tar-1.15.1-5.3.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/tar-1.15.1-5.3.20060mlcs4.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/tar-1.16-3.1mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/tar-1.16-3.1mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/tar-1.16-3.1mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/tar-1.16-3.1mdv2007.1.src.rpm

FreeBSD
Actualiza FreeBSD a 5-STABLE, o 6-STABLE, o a RELENG_6_2, RELENG_6_1, o RELENG_5_5 con una fecha posterior a la fecha de correción de la vulnerabilidad.
FreeBSD 5.5, 6.1, 6.2 - Aplica los siguientes parches
http://security.FreeBSD.org/patches/SA-07:10/gtar.patch
http://security.FreeBSD.org/patches/SA-07:10/gtar.patch.asc

Apple
Security Update 2007-009 / Mac OS X 10.4.11 (Universal)
http://www.apple.com/support/downloads/securityupdate200700910411universal.html
Security Update 2007-009 / Max OS X 10.4.11 (PPC)
http://www.apple.com/support/downloads/securityupdate200700910411ppc.html
Security Update 2007-009 / Max OS X 10.5.1
http://www.apple.com/support/downloads/securityupdate20070091051.html

Debian (DSA 1438-1)

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/t/tar/tar_1.14.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.dsc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4.diff.gz
alpha
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_alpha.deb
amd64
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_amd64.deb
arm
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_arm.deb
hppa
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_hppa.deb
i386
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_i386.deb
ia64
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_ia64.deb
m68k
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_m68k.deb
mips
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mips.deb
mipsel
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_mipsel.deb
powerpc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_powerpc.deb
s390
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_s390.deb
sparc
http://security.debian.org/pool/updates/main/t/tar/tar_1.14-2.4_sparc.deb

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.diff.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1.dsc
alpha
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_alpha.deb
amd64
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_amd64.deb
arm
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_arm.deb
hppa
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_hppa.deb
i386
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_i386.deb
ia64
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_ia64.deb
mips
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mips.deb
mipsel
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_mipsel.deb
powerpc
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_powerpc.deb
s390
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_s390.deb
sparc
http://security.debian.org/pool/updates/main/t/tar/tar_1.16-2etch1_sparc.deb

Sun (273551)
Solaris 10 / SPARC / patch 139099-03
Solaris 10 / x86 / patch 139100-03
OpenSolaris / upon builds snv_116 o posterior
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

Standar resources

Property Value
CVE CVE-2007-4131
BID

Other resources

Red Hat Security Advisory (RHSA-2007:0860-2)
https://rhn.redhat.com/errata/RHSA-2007-0860.html

SUSE Security Summary Report (SUSE-SR:2007:018)
http://www.novell.com/linux/security/advisories/2007_18_sr.html

Mandriva Security Advisory (MDKSA-2007:173)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:173

FreeBSD Security Advisory (FreeBSD-SA-07:10.gtar)
http://security.freebsd.org/advisories/FreeBSD-SA-07:10.gtar.asc

Apple Security Update (307179)
http://docs.info.apple.com/article.html?artnum=307179

Debian Security Advisory (DSA 1438-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00221.html

Sun Alert Notification (273551)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273551-1

Version history

Version Comments Date
1.0 Aviso emitido 2007-08-24
1.1 Aviso emitido por Suse (SUSE-SR:2007:018) 2007-09-03
1.2 Aviso emitido por Mandriva (MDKSA-2007:173) 2007-09-05
1.3 Aviso emitido por FreeBSD (FreeBSD-SA-07:10.gtar) 2007-12-03
1.4 Aviso emitido por Apple (307179) 2007-12-27
1.5 Aviso emitido por Debian (DSA 1438-1) 2008-01-03
1.6 Aviso emitido por Sun (273551) 2009-12-19
Ministerio de Defensa
CNI
CCN
CCN-CERT