UBUNTU-CVE-2016-10729

Source
https://ubuntu.com/security/CVE-2016-10729
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10729.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2016-10729
Upstream
Published
2018-10-24T21:29:00Z
Modified
2025-09-08T16:43:59Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

References

Affected packages

Ubuntu:Pro:16.04:LTS / amanda

Package

Name
amanda
Purl
pkg:deb/ubuntu/amanda@1:3.3.6-4.1ubuntu0.1+esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:3.*

1:3.3.6-4
1:3.3.6-4.1
1:3.3.6-4.1ubuntu0.1
1:3.3.6-4.1ubuntu0.1+actuallyesm2
1:3.3.6-4.1ubuntu0.1+esm1
1:3.3.6-4.1ubuntu0.1+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:3.3.6-4.1ubuntu0.1+esm2",
            "binary_name": "amanda-client"
        },
        {
            "binary_version": "1:3.3.6-4.1ubuntu0.1+esm2",
            "binary_name": "amanda-common"
        },
        {
            "binary_version": "1:3.3.6-4.1ubuntu0.1+esm2",
            "binary_name": "amanda-server"
        }
    ]
}