Lucene search

K
amazonAmazonALAS-2023-1704
HistoryMar 17, 2023 - 3:53 p.m.

Important: tar

2023-03-1715:53:00
alas.aws.amazon.com
10

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.0005 Low

EPSS

Percentile

17.5%

Issue Overview:

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters. (CVE-2022-48303)

Affected Packages:

tar

Issue Correction:
Run yum update tar to update your system.

New Packages:

i686:  
    tar-1.26-31.23.amzn1.i686  
    tar-debuginfo-1.26-31.23.amzn1.i686  
  
src:  
    tar-1.26-31.23.amzn1.src  
  
x86_64:  
    tar-1.26-31.23.amzn1.x86_64  
    tar-debuginfo-1.26-31.23.amzn1.x86_64  

Additional References

Red Hat: CVE-2022-48303

Mitre: CVE-2022-48303

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

0.0005 Low

EPSS

Percentile

17.5%