High severity7.5NVD Advisory· Published Dec 9, 2016· Updated May 6, 2026
CVE-2016-6321
CVE-2016-6321
Description
Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- git.savannah.gnu.org/cgit/tar.git/commit/nvdIssue TrackingPatch
- seclists.org/fulldisclosure/2016/Oct/102nvdMailing ListPatchThird Party Advisory
- packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.htmlnvdExploitThird Party AdvisoryVDB Entry
- lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.htmlnvdMailing ListVendor Advisory
- seclists.org/fulldisclosure/2016/Oct/96nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/93937nvdThird Party AdvisoryVDB Entry
- sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txtnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3702nvd
- www.ubuntu.com/usn/USN-3132-1nvd
- lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3Envd
- lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3Envd
- security.gentoo.org/glsa/201611-19nvd
News mentions
0No linked articles in our index yet.