CVE-2016-6321

EUVD-2016-7248
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
gnutar
1.14
gnutar
1.15
gnutar
1.15.1
gnutar
1.15.90
gnutar
1.15.91
gnutar
1.16
gnutar
1.16.1
gnutar
1.17
gnutar
1.18
gnutar
1.19
gnutar
1.20
gnutar
1.21
gnutar
1.22
gnutar
1.23
gnutar
1.24
gnutar
1.25
gnutar
1.26
gnutar
1.27
gnutar
1.27.1
gnutar
1.28
gnutar
1.29
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tar
bookworm
1.34+dfsg-1.2+deb12u1
fixed
bullseye
1.34+dfsg-1+deb11u1
fixed
sid
1.35+dfsg-3
fixed
trixie
1.35+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tar
precise
Fixed 1.26-4ubuntu1.1
released
trusty
Fixed 1.27.1-1ubuntu0.1
released
xenial
Fixed 1.28-2.1ubuntu0.1
released
yakkety
Fixed 1.29b-1ubuntu0.1
released
zesty
not-affected
References