GNU tar 1.14.1

CPE Details

GNU tar 1.14.1
1.14.1
2007-08-23
19h16 +00:00
2007-09-14
15h36 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnu:tar:1.14.1:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

tar

Version

1.14.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-48303 2023-01-30 00h00 +00:00 GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
5.5
Medium
CVE-2021-20193 2021-03-26 15h41 +00:00 A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
3.3
Low
CVE-2019-9923 2019-03-22 06h06 +00:00 pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
7.5
High
CVE-2018-20482 2018-12-26 17h00 +00:00 GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
4.7
Medium
CVE-2010-0624 2010-03-12 19h00 +00:00 Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
6.8
CVE-2007-4476 2007-09-04 23h00 +00:00 Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
7.5
CVE-2006-0300 2006-02-23 23h00 +00:00 Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
5.1