Secunia Security Advisory - A vulnerability has been reported in GNU tar, which can potentially be exploited by malicious people to compromise a vulnerable system.
f7bd4936d01cb2d9baf384782da995d5e0f193cdb337ea8e46a285c76e5e7c3a
----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA
https://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
GNU Tar "rmt" Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA38836
VERIFY ADVISORY:
https://secunia.com/advisories/38836/
DESCRIPTION:
A vulnerability has been reported in GNU tar, which can potentially
be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the client
implementation for the "rmt" (remote magtape) protocol, which can be
exploited to cause a buffer overflow.
Successful exploitation may allow execution of arbitrary code, but
requires that a user is tricked into connecting to a malicious "rmt"
server, e.g. by opening a tar file including a colon in the file
name.
SOLUTION:
Update to version 1.23.
PROVIDED AND/OR DISCOVERED BY:
Jakob Lell, TU Berlin computer security working group (AGRS)
ORIGINAL ADVISORY:
GNU:
https://www.gnu.org/software/tar/#TOCreleases
Jakob Lell:
https://www.agrs.tu-berlin.de/index.php?id=78327
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------