{"uuid": "aae65092-ba8f-471c-9627-99047137bae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-6321", "type": "seen", "source": "https://t.me/itsecalert/49", "content": "\u26a0\ufe0f GNU tar extract pathname bypass CVE-2016-6321: enables file and directory overwrite attacks against the user \nor system by using a crafted tar archive. In the worst-case scenario this vulnerability can lead to a full \nsystem compromise (remote code execution as root). (severity: \ud83d\udd37 low) Further Info: http://mcaf.ee/p46bzw\n* GNU tar maintainer didn't consider this to be an issue. as a result mitigation in upstream GNU tar appears unlikely\n#severitylow #linux", "creation_timestamp": "2016-10-28T17:43:27.000000Z"}