{"id":"UBUNTU-CVE-2016-10729","details":"An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The \"runtar\" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.","modified":"2025-09-08T16:43:59Z","published":"2018-10-24T21:29:00Z","upstream":["CVE-2016-10729"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10729"},{"type":"REPORT","url":"https://www.exploit-db.com/exploits/39217/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-10729"}],"affected":[{"package":{"name":"amanda","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/amanda@1:3.3.6-4.1ubuntu0.1+esm2?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:3.3.6-4","1:3.3.6-4.1","1:3.3.6-4.1ubuntu0.1","1:3.3.6-4.1ubuntu0.1+actuallyesm2","1:3.3.6-4.1ubuntu0.1+esm1","1:3.3.6-4.1ubuntu0.1+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"amanda-client","binary_version":"1:3.3.6-4.1ubuntu0.1+esm2"},{"binary_name":"amanda-common","binary_version":"1:3.3.6-4.1ubuntu0.1+esm2"},{"binary_name":"amanda-server","binary_version":"1:3.3.6-4.1ubuntu0.1+esm2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10729.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}