5
CVSSv2

CVE-2016-6321

Published: 09/12/2016 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 up to and including 1.29 might allow remote malicious users to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu tar 1.26

gnu tar 1.27.1

gnu tar 1.23

gnu tar 1.29

gnu tar 1.25

gnu tar 1.22

gnu tar 1.18

gnu tar 1.19

gnu tar 1.20

gnu tar 1.17

gnu tar 1.27

gnu tar 1.15.90

gnu tar 1.16

gnu tar 1.28

gnu tar 1.14

gnu tar 1.24

gnu tar 1.15.91

gnu tar 1.15

gnu tar 1.15.1

gnu tar 1.21

gnu tar 1.16.1

Vendor Advisories

Debian Bug report logs - #842339 tar: CVE-2016-6321: Bypassing the extract path name Package: tar; Maintainer for tar is Bdale Garbee <bdale@gagcom>; Source for tar is src:tar (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 28 Oct 2016 08:30:01 UTC Severity: grave Tags: fixed-upstr ...
tar could be made to overwrite files ...
Harry Sintonen discovered that GNU tar does not properly handle member names containing '', thus allowing an attacker to bypass the path names specified on the command line and replace files and directories in the target directory For the stable distribution (jessie), this problem has been fixed in version 1271-2+deb8u1 For the unstable distr ...
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 114 through 129 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER ...
The GNU tar archiver attempts to avoid path traversal attacks by removing offending parts of the element name at extract This sanitizing leads to a vulnerability where the attacker can bypass the path name(s) specified on the command line leading to arbitrary overwrite of files and directories inside the target directory ...

Exploits

The GNU tar archiver can be tricked into extracting files and directories in the given destination, regardless of the path name(s) specified on the command line Versions 114 through 129 are affected ...