SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
(Red Hat Issues Fix) Perl Archive::Tar Directory Traversal Flaw Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1024164
SecurityTracker URL:  http://securitytracker.com/id/1024164
CVE Reference:   CVE-2007-4829   (Links to External Site)
Date:  Jul 1 2010
Impact:   Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Perl Archive::Tar module. A local user can obtain elevated privileges on the target system.

A user can create a specially crafted tar file that, when extracted by the target user or application, will overwrite arbitrary files with the privileges of the target user or application.

Impact:   A local user can overwrite arbitrary files with elevated privileges on the target system.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2010-0505.html

Vendor URL:  perl.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  4, 5

Message History:   None.


 Source Message Contents

Subject:  [RHSA-2010:0505-01] Moderate: perl-Archive-Tar security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: perl-Archive-Tar security update
Advisory ID:       RHSA-2010:0505-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0505.html
Issue date:        2010-07-01
CVE Names:         CVE-2007-4829 
=====================================================================

1. Summary:

An updated perl-Archive-Tar package that fixes multiple security issues is
now available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - noarch
Red Hat Enterprise Linux AS version 4 - noarch
Red Hat Enterprise Linux Desktop (v. 5 client) - noarch
Red Hat Enterprise Linux Desktop version 4 - noarch
Red Hat Enterprise Linux ES version 4 - noarch
Red Hat Enterprise Linux WS version 4 - noarch

3. Description:

The Archive::Tar module provides a mechanism for Perl scripts to manipulate
tar archive files.

Multiple directory traversal flaws were discovered in the Archive::Tar
module. A specially-crafted tar file could cause a Perl script, using the
Archive::Tar module to extract the archive, to overwrite an arbitrary file
writable by the user running the script. (CVE-2007-4829)

This package upgrades the Archive::Tar module to version 1.39_01. Refer to
the Archive::Tar module's changes file, linked to in the References, for a
full list of changes.

Users of perl-Archive-Tar are advised to upgrade to this updated package,
which corrects these issues. All applications using the Archive::Tar module
must be restarted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

295021 - CVE-2007-4829 perl-Archive-Tar directory traversal flaws

6. Package List:

Red Hat Enterprise Linux AS version 4:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el4_8.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el4_8.1.noarch.rpm

Red Hat Enterprise Linux Desktop version 4:

Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el4_8.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el4_8.1.noarch.rpm

Red Hat Enterprise Linux ES version 4:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el4_8.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el4_8.1.noarch.rpm

Red Hat Enterprise Linux WS version 4:

Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el4_8.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el4_8.1.noarch.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el5_5.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el5_5.1.noarch.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/perl-Archive-Tar-1.39.1-1.el5_5.1.src.rpm

noarch:
perl-Archive-Tar-1.39.1-1.el5_5.1.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2007-4829.html
http://www.redhat.com/security/updates/classification/#moderate
http://cpansearch.perl.org/src/KANE/Archive-Tar-1.39_01/CHANGES

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFMLOdwXlSAg2UNWIIRAloSAJ4hQznhaWrK8w/1MrMCdwMFndc/jQCfYhRz
qWeLitHY/gMNDa9MmOV5CQs=
=QOKv
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC