CVE-2016-6321

Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
gnutar
1.14
gnutar
1.15
gnutar
1.15.1
gnutar
1.15.90
gnutar
1.15.91
gnutar
1.16
gnutar
1.16.1
gnutar
1.17
gnutar
1.18
gnutar
1.19
gnutar
1.20
gnutar
1.21
gnutar
1.22
gnutar
1.23
gnutar
1.24
gnutar
1.25
gnutar
1.26
gnutar
1.27
gnutar
1.27.1
gnutar
1.28
gnutar
1.29
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tar
bullseye
1.34+dfsg-1+deb11u1
fixed
bookworm
1.34+dfsg-1.2+deb12u1
fixed
sid
1.35+dfsg-3
fixed
trixie
1.35+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tar
zesty
not-affected
yakkety
Fixed 1.29b-1ubuntu0.1
released
xenial
Fixed 1.28-2.1ubuntu0.1
released
trusty
Fixed 1.27.1-1ubuntu0.1
released
precise
Fixed 1.26-4ubuntu1.1
released
References