Home page logo
/

bugtraq logo Bugtraq mailing list archives

[ESA-20021003-022] tar: directory traversal vulnerability.
From: EnGarde Secure Linux <security () guardiandigital com>
Date: Thu, 3 Oct 2002 08:41:58 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory                October 03, 2002 |
| http://www.engardelinux.org/                          ESA-20021003-022 |
|                                                                        |
| Package: tar                                                           |
| Summary: directory traversal vulnerability.                            |
+------------------------------------------------------------------------+

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.

OVERVIEW
- --------
  There is a directory traversal vulnerability in tar which may allow an
  attacker to overwrite arbitrary files by tricking the administrator
  into extracting a malicious archive.

SOLUTION
- --------
  Users of the EnGarde Professional edition can use the Guardian Digital
  Secure Network to update their systems automatically.

  EnGarde Community users should upgrade to the most recent version
  as outlined in this advisory.  Updates may be obtained from:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.engardelinux.org/pub/engarde/stable/updates/

  Before upgrading the package, the machine must either:

    a) be booted into a "standard" kernel; or
    b) have LIDS disabled.

  To disable LIDS, execute the command:

    # /sbin/lidsadm -S -- -LIDS_GLOBAL

  To install the updated package, execute the command:

    # rpm -Uvh files

  You must now update the LIDS configuration by executing the command:

    # /usr/sbin/config_lids.pl

  To re-enable LIDS (if it was disabled), execute the command:

    # /sbin/lidsadm -S -- +LIDS_GLOBAL

  To verify the signatures of the updated packages, execute the command:

    # rpm -Kv files

UPDATED PACKAGES
- ----------------
  These updated packages are for EnGarde Secure Linux Community
  Edition.

  Source Packages:

    SRPMS/tar-1.13.25-1.0.5.src.rpm
      MD5 Sum: f4467170ff88d0a89abb2d1e0d4b23c3

  Binary Packages:

    i386/tar-1.13.25-1.0.5.i386.rpm
      MD5 Sum: 48a78e985fa73b15c7bb597ede2d7578

    i686/tar-1.13.25-1.0.5.i686.rpm
      MD5 Sum: d3dcf70784b6863f30b8813be42050bf

REFERENCES
- ----------
  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  tar's Official Web Site:
    http://www.gnu.org/software/tar/

  Security Contact:   security () guardiandigital com
  EnGarde Advisories: http://www.engardelinux.org/advisories.html

- --------------------------------------------------------------------------
$Id: ESA-20021003-022-tar,v 1.1 2002/10/03 12:28:20 rwm Exp $
- --------------------------------------------------------------------------
Author: Ryan W. Maple <ryan () guardiandigital com> 
Copyright 2002, Guardian Digital, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9nDspHD5cqd57fu0RArOvAJ9pEgp3PIiplVGHT/WV81pLfK16CACfWYRw
UmylR2vT1LNgpqdZp14pv/Y=
=qtjX
-----END PGP SIGNATURE-----


  By Date           By Thread  

Current thread:
  • [ESA-20021003-022] tar: directory traversal vulnerability. EnGarde Secure Linux (Oct 03)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault