Details
VMware Security Response | |
CVE identifier | CVE-2006-6097 |
Synopsis | Path traversal flaw in the way GNU tar extracted archives |
CVE URL | |
Response issued on | December 20, 2006 |
Response updated on |
|
Relevant Release
ESX Server versions
- 2.0.2
- 2.1.3
- 2.5.3
- 2.5.4
- 2.5.5
- 3.0.0
- 3.0.1
Problem Description
CVE-2006-6097 reports the following issue:
GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
Red Hat security advisory RHSA-2006-0749 reports the issue as:
Teemu Salmela discovered a path traversal flaw in the way GNU tar extracted archives. A malicious user could create a tar archive that could write to arbitrary files to which the user running GNU tar has write access. (CVE-2006-6097)
Solution
A fix for this issue will be included in upcoming patch releases for ESX Server.
Based on VMware KB 2240267