Joined: 12 May 2004
|Posted: Fri Feb 21, 2014 8:26 am Post subject: [ GLSA 201402-19 ] libtar: Arbitraty code execution
|Gentoo Linux Security Advisory
Title: libtar: Arbitraty code execution (GLSA 201402-19)
Date: February 21, 2014
A buffer overflow in libtar might allow remote attackers to execute
arbitrary code or cause a Denial of Service condition.
libtar is a C library for manipulating POSIX tar files.
Vulnerable: < 1.2.20-r2
Unaffected: >= 1.2.20-r2
Architectures: All supported architectures
An integer overflow error within the “th_read()” function when
processing long names or link extensions can be exploited to cause a
heap-based buffer overflow via a specially crafted archive.
A remote attacker could entice a user to open a specially crafted file
using a program linked against libtar, possibly resulting in execution of
arbitrary code with the privileges of the process or a Denial of Service
There is no known workaround at this time.
All libtar users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libtar-1.2.20-r2"