// For flags

CVE-2013-4420

Debian Security Advisory 2863-1

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple directory traversal vulnerabilities in the (1) tar_extract_glob and (2) tar_extract_all functions in libtar 1.2.20 and earlier allow remote attackers to overwrite arbitrary files via a .. (dot dot) in a crafted tar file.

MĂșltiples vulnerabilidades de salto de directorio en las funciones (1) tar_extract_glob y (2) tar_extract_all en libtar 1.2.20 y anteriores permiten a atacantes remotos sobreescribir archivos arbitrarios a travĂ©s de un .. (punto punto) en un archivo TAR manipulado.

A directory traversal attack was reported against libtar, a C library for manipulating tar archives. The application does not validate the filenames inside the tar archive, allowing to extract files in arbitrary path. An attacker can craft a tar file to override files beyond the tar_extract_glob and tar_extract_all prefix parameter. The updated packages have been patched to correct this issue.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2014-02-20 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
<= 1.2.20
Search vendor "Feep" for product "Libtar" and version " <= 1.2.20"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.11
Search vendor "Feep" for product "Libtar" and version "1.2.11"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.13
Search vendor "Feep" for product "Libtar" and version "1.2.13"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.14
Search vendor "Feep" for product "Libtar" and version "1.2.14"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.15
Search vendor "Feep" for product "Libtar" and version "1.2.15"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.16
Search vendor "Feep" for product "Libtar" and version "1.2.16"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.17
Search vendor "Feep" for product "Libtar" and version "1.2.17"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.18
Search vendor "Feep" for product "Libtar" and version "1.2.18"
-
Affected
Feep
Search vendor "Feep"
Libtar
Search vendor "Feep" for product "Libtar"
1.2.19
Search vendor "Feep" for product "Libtar" and version "1.2.19"
-
Affected