4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
32.6%
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw
allows an attacker who can submit a crafted input file to tar to cause
uncontrolled consumption of memory. The highest threat from this
vulnerability is to system availability.
Author | Note |
---|---|
sbeattie | the tar command failed to free memory. As this is a command line tool denial of service, this has been rated as priority low |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | tar | < 1.29b-2ubuntu0.3 | UNKNOWN |
ubuntu | 20.04 | noarch | tar | < 1.30+dfsg-7ubuntu0.20.04.2 | UNKNOWN |
ubuntu | 21.04 | noarch | tar | < 1.34+dfsg-1build1 | UNKNOWN |
ubuntu | 21.10 | noarch | tar | < 1.34+dfsg-1build1 | UNKNOWN |
ubuntu | 22.04 | noarch | tar | < 1.34+dfsg-1build1 | UNKNOWN |
ubuntu | 22.10 | noarch | tar | < 1.34+dfsg-1build1 | UNKNOWN |
ubuntu | 23.04 | noarch | tar | < 1.34+dfsg-1build1 | UNKNOWN |
ubuntu | 14.04 | noarch | tar | < 1.27.1-1ubuntu0.1+esm2 | UNKNOWN |
ubuntu | 16.04 | noarch | tar | < 1.28-2.1ubuntu0.2+esm1 | UNKNOWN |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
32.6%