{"id":"CVE-2006-0300","details":"Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.","modified":"2026-04-10T03:37:24.738225Z","published":"2006-02-24T00:02:00Z","related":["openSUSE-SU-2024:11422-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/18973"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18976"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18999"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19016"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19093"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19130"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19152"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19236"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20042"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24479"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24966"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-987"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_05_sr.html"},{"type":"ADVISORY","url":"http://www.trustix.org/errata/2006/0010"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/0684"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/0930"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1470"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2518"},{"type":"ADVISORY","url":"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046"},{"type":"FIX","url":"http://secunia.com/advisories/18976"},{"type":"FIX","url":"http://secunia.com/advisories/18999"},{"type":"FIX","url":"http://www.osvdb.org/23371"},{"type":"FIX","url":"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:046"},{"type":"WEB","url":"http://docs.info.apple.com/article.html?artnum=305214"},{"type":"WEB","url":"http://docs.info.apple.com/article.html?artnum=305391"},{"type":"WEB","url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"type":"WEB","url":"http://lists.gnu.org/archive/html/bug-tar/2006-02/msg00051.html"},{"type":"WEB","url":"http://securityreason.com/securityalert/480"},{"type":"WEB","url":"http://securityreason.com/securityalert/543"},{"type":"WEB","url":"http://securitytracker.com/id?1015705"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-241646-1"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-200603-06.xml"},{"type":"WEB","url":"http://www.openpkg.org/security/OpenPKG-SA-2006.006-tar.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0232.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/430299/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/16764"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24855"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5252"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5978"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5993"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6094"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9295"},{"type":"WEB","url":"https://usn.ubuntu.com/257-1/"}],"schema_version":"1.7.5"}