GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Feb 21, 2014 8:26 am Post subject: [ GLSA 201402-19 ] libtar: Arbitraty code execution |
|
|
Gentoo Linux Security Advisory
Title: libtar: Arbitraty code execution (GLSA 201402-19)
Severity: normal
Exploitable: remote
Date: February 21, 2014
Bug(s): #487420
ID: 201402-19
Synopsis
A buffer overflow in libtar might allow remote attackers to execute
arbitrary code or cause a Denial of Service condition.
Background
libtar is a C library for manipulating POSIX tar files.
Affected Packages
Package: dev-libs/libtar
Vulnerable: < 1.2.20-r2
Unaffected: >= 1.2.20-r2
Architectures: All supported architectures
Description
An integer overflow error within the “th_read()” function when
processing long names or link extensions can be exploited to cause a
heap-based buffer overflow via a specially crafted archive.
Impact
A remote attacker could entice a user to open a specially crafted file
using a program linked against libtar, possibly resulting in execution of
arbitrary code with the privileges of the process or a Denial of Service
condition.
Workaround
There is no known workaround at this time.
Resolution
All libtar users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libtar-1.2.20-r2"
|
References
CVE-2013-4397 |
|