Unrated severityNVD Advisory· Published Sep 5, 2007· Updated Apr 23, 2026
CVE-2007-4476
CVE-2007-4476
Description
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
Affected products
6cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
37- secunia.com/advisories/26674nvdPatchThird Party Advisory
- bugs.gentoo.org/show_bug.cginvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- kb.juniper.net/InfoCenter/indexnvdThird Party Advisory
- secunia.com/advisories/26987nvdThird Party Advisory
- secunia.com/advisories/27331nvdThird Party Advisory
- secunia.com/advisories/27453nvdThird Party Advisory
- secunia.com/advisories/27514nvdThird Party Advisory
- secunia.com/advisories/27681nvdThird Party Advisory
- secunia.com/advisories/27857nvdThird Party Advisory
- secunia.com/advisories/28255nvdThird Party Advisory
- secunia.com/advisories/29968nvdThird Party Advisory
- secunia.com/advisories/32051nvdThird Party Advisory
- secunia.com/advisories/33567nvdThird Party Advisory
- secunia.com/advisories/39008nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200711-18.xmlnvdThird Party Advisory
- www.debian.org/security/2007/dsa-1438nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1566nvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0141.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0144.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/26445nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-650-1nvdThird Party Advisory
- www.ubuntu.com/usn/usn-709-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7114nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8599nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9336nvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2007-November/msg00073.htmlnvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.htmlnvdThird Party Advisory
- sunsolve.sun.com/search/document.donvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.novell.com/linux/security/advisories/2007_18_sr.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2007_19_sr.htmlnvdBroken Link
- www.vupen.com/english/advisories/2010/0628nvdPermissions Required
- www.vupen.com/english/advisories/2010/0629nvdPermissions Required
- issues.rpath.com/browse/RPL-1861nvdBroken Link
News mentions
0No linked articles in our index yet.