{"id":"CVE-2010-0624","details":"Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.","modified":"2026-04-10T03:41:09.085008Z","published":"2010-03-15T13:28:25Z","related":["openSUSE-SU-2024:10143-1","openSUSE-SU-2024:10382-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/38869"},{"type":"ADVISORY","url":"http://secunia.com/advisories/38988"},{"type":"ADVISORY","url":"http://secunia.com/advisories/39008"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-201111-11.xml"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:065"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2456-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0628"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0629"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0639"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0687"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0728"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0729"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/1107"},{"type":"EVIDENCE","url":"http://www.agrs.tu-berlin.de/index.php?id=78327"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=564368"},{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691"},{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036668.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037395.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037401.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038134.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038149.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"},{"type":"WEB","url":"http://osvdb.org/62950"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0141.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0142.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0144.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2010-0145.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/514503/100/0/threaded"},{"type":"WEB","url":"https://issues.rpath.com/browse/RPL-3219"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10277"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6907"}],"schema_version":"1.7.5"}