CVE-2006-0300

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-0300
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-0300.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-0300
Related
Published
2006-02-24T00:02:00Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.

References

Affected packages

Debian:11 / tar

Package

Name
tar
Purl
pkg:deb/debian/tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.1-3

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / tar

Package

Name
tar
Purl
pkg:deb/debian/tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.1-3

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / tar

Package

Name
tar
Purl
pkg:deb/debian/tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15.1-3

Ecosystem specific

{
    "urgency": "high"
}