CVE-2007-4131
Published Aug 25, 2007
Last updated 6 years ago
Overview
- Description
- Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "49EF5B77-9BC9-4AE8-A677-48E5E576BE63" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:desktop:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3499D0E2-C80B-4B91-8843-8EC3C22E8BC4" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36389D32-61C1-4487-8399-FA7D2864FACD" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "49B67F74-AF8F-4A27-AA8A-A8479E256A9F" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "40D71CBC-D365-4710-BAB5-8A1159F35E41" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8" }, { "criteria": "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:tar:1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1FA7050-9C48-490C-974E-BBED58A70E9E" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BCC81C4-718C-4D1C-9C0B-A49B6986D9EC" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "504BA480-EF7F-4604-A9D4-50C6C8576D1E" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2095CF90-0433-4F9A-A5F5-74A5C401E703" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "322AD74F-6976-4261-9609-5678293B1FDC" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "471DDE51-BE1B-48D1-AC07-D8CE971F0F9E" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FAAF649-BE68-47E2-BD25-EF9DF9B26655" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F94C4466-E3D2-4275-86A8-5D180F493B04" }, { "criteria": "cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60CD7558-833D-473B-99A4-854FB6CC6C9A" }, { "criteria": "cpe:2.3:a:gnu:tar:1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B87C1F89-63A8-4955-9C42-3B49EC1C1C78" }, { "criteria": "cpe:2.3:a:gnu:tar:1.14.90:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E3F6678-D645-4614-8C57-2833BE8BE77E" }, { "criteria": "cpe:2.3:a:gnu:tar:1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FE339D0-D585-440D-8BD4-5183833258F4" }, { "criteria": "cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8B4A20D-AAD0-4857-AC0F-D221EBB08BFD" }, { "criteria": "cpe:2.3:a:gnu:tar:1.15.90:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9B46F22-B0FB-4F99-B44E-D34E0DD5D194" }, { "criteria": "cpe:2.3:a:gnu:tar:1.15.91:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D8F228C-6DED-42A2-BE9B-944171EAC10C" }, { "criteria": "cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B6D83BA-6C85-43F3-87FD-A77CC6F1D21A" } ], "operator": "OR" } ], "operator": "AND" } ]