Vulnerability Details : CVE-2007-4476
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Vulnerability category: Overflow
Threat overview for CVE-2007-4476
Top countries where our scanners detected CVE-2007-4476
Top open port discovered on systems with this issue
5555
IPs affected by CVE-2007-4476 121
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-4476!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-4476
Probability of exploitation activity in the next 30 days: 0.63%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-4476
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2007-4476
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-4476
-
Red Hat 2010-03-15This issue was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2010-0141.html for tar. It did not affect the version of tar as shipped with Red Hat Enterprise Linux 3. This issue was also addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0144.html for cpio. It did not affect the version of cpio as shipped with Red Hat Enterprise Linux 3 and 4.
-
http://www.novell.com/linux/security/advisories/2007_19_sr.html
404 Page Not Found | SUSEBroken Link
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:233
Broken Link
-
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.html
Third Party Advisory
-
http://www.novell.com/linux/security/advisories/2007_18_sr.html
Broken Link
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336
Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPViewThird Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0144.html
SupportThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/0628
Webmail | OVH- OVHPermissions Required
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
Juniper Networks - 2015-07 Security Bulletin: CTPView: Multiple vulnerabilities in CTPViewThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7114
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2010-0141.html
SupportThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8599
Third Party Advisory
-
http://www.vupen.com/english/advisories/2010/0629
Webmail | OVH- OVHPermissions Required
-
http://www.ubuntu.com/usn/usn-650-1
Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:197
Broken Link
-
http://security.gentoo.org/glsa/glsa-200711-18.xml
Third Party Advisory
-
https://issues.rpath.com/browse/RPL-1861
Broken Link
-
http://bugs.gentoo.org/show_bug.cgi?id=196978
Third Party Advisory
-
http://www.debian.org/security/2007/dsa-1438
Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html
Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=280961
Issue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/26445
Third Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/usn-709-1
Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1
Broken Link
-
http://www.debian.org/security/2008/dsa-1566
Third Party Advisory
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*