CVE-2005-1918
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
31/12/2005
Last modified:
03/04/2025
Description
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
Impact
Base Score 2.0
2.60
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:tar:1.13.25:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:* | ||
| cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
- http://secunia.com/advisories/18988
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19183
- http://secunia.com/advisories/20397
- http://securitytracker.com/id?1015655=
- http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.redhat.com/support/errata/RHSA-2006-0195.html
- http://www.securityfocus.com/archive/1/430297/100/0/threaded
- http://www.securityfocus.com/bid/5834
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
- ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
- http://secunia.com/advisories/18988
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19183
- http://secunia.com/advisories/20397
- http://securitytracker.com/id?1015655=
- http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://www.redhat.com/support/errata/RHSA-2006-0195.html
- http://www.securityfocus.com/archive/1/430297/100/0/threaded
- http://www.securityfocus.com/bid/5834
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946



