Secunia Security Advisory - Some vulnerabilities have been reported in the Python tarfile module, which can be exploited by malicious people to compromise a vulnerable system.
58f8e156d2b46d2a1a475e5304f2aad0000488054c231e6cef799c96da1c3530
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Python tarfile Module Directory Traversal and Symlink Vulnerability
SECUNIA ADVISORY ID:
SA26623
VERIFY ADVISORY:
http://secunia.com/advisories/26623/
CRITICAL:
Less critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Python 2.5.x
http://secunia.com/product/14172/
DESCRIPTION:
Some vulnerabilities have been reported in the Python tarfile module,
which can be exploited by malicious people to compromise a vulnerable
system.
The vulnerabilities are caused due to input validation errors when
extracting tar archives. This can be exploited to extract files to
arbitrary locations outside the specified directory with the
permissions of the application using the tarfile module by using the
"../" directory traversal sequence or malicious symlinks in a
specially crafted tar archive.
The vulnerabilities are reported in Python 2.5. Other versions may
also be affected.
SOLUTION:
Do not extract untrusted tar archives.
PROVIDED AND/OR DISCOVERED BY:
Jan Matejek
ORIGINAL ADVISORY:
http://mail.python.org/pipermail/python-dev/2007-August/074290.html
http://bugs.python.org/issue1044
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------