6.6 Medium
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.017 Low
EPSS
Percentile
87.3%
Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //… (slash slash dot dot) sequences in directory symlinks in a TAR archive.
ftp://ftp.berlios.de/pub/star/alpha/AN-1.5a84
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
secunia.com/advisories/26626
secunia.com/advisories/26672
secunia.com/advisories/26673
secunia.com/advisories/26857
secunia.com/advisories/27318
secunia.com/advisories/27544
securitytracker.com/id?1018646
support.avaya.com/elmodocs2/security/ASA-2007-414.htm
www.gentoo.org/security/en/glsa/glsa-200710-23.xml
www.redhat.com/archives/fedora-package-announce/2007-August/msg00425.html
www.redhat.com/support/errata/RHSA-2007-0873.html
www.securityfocus.com/archive/1/478797/100/200/threaded
bugs.gentoo.org/show_bug.cgi?id=189690
issues.rpath.com/browse/RPL-1669
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11098