This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Libarchive First view 2013-09-30
Product Libarchive Last view 2023-05-29
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:libarchive:libarchive:2.8.2:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.0.2:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.1.2:-:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.1.1:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.1.0:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.0.1b:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.0.0a:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:2.8.4:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:2.8.3:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:2.8.1:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:2.8.0:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.0.3:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.0.4:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:2.8.5:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:* 45
cpe:2.3:a:libarchive:libarchive:3.1.2:*:*:*:*:x64:*:* 45
cpe:2.3:a:libarchive:libarchive:3.1.901a:*:*:*:*:*:*:* 43
cpe:2.3:a:libarchive:libarchive:3.1.900a:*:*:*:*:*:*:* 43
cpe:2.3:a:libarchive:libarchive:3.2.0:*:*:*:*:*:*:* 21
cpe:2.3:a:libarchive:libarchive:3.3.2:*:*:*:*:*:*:* 18
cpe:2.3:a:libarchive:libarchive:3.2.2:*:*:*:*:*:*:* 18
cpe:2.3:a:libarchive:libarchive:3.2.1:*:*:*:*:*:*:* 17
cpe:2.3:a:libarchive:libarchive:3.3.0:*:*:*:*:*:*:* 14
cpe:2.3:a:libarchive:libarchive:3.3.1:*:*:*:*:*:*:* 14
cpe:2.3:a:libarchive:libarchive:3.3.3:*:*:*:*:*:*:* 14
cpe:2.3:a:libarchive:libarchive:3.4.0:*:*:*:*:*:*:* 7
cpe:2.3:a:libarchive:libarchive:3.4.1:*:*:*:*:*:*:* 7
cpe:2.3:a:libarchive:libarchive:3.6.0:*:*:*:*:*:*:* 3
cpe:2.3:a:libarchive:libarchive:3.6.1:*:*:*:*:*:*:* 2

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2023-05-29 CVE-2023-30571

Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.

9.8 2022-11-22 CVE-2022-36227

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

7.8 2022-08-23 CVE-2021-31566

An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.

7.8 2022-08-23 CVE-2021-23177

An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.

6.5 2022-03-28 CVE-2022-26280

Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init.

6.5 2021-07-20 CVE-2021-36976

libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).

6.5 2020-10-15 CVE-2020-21674

Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.

8.8 2020-02-20 CVE-2020-9308

archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to unpack a RAR5 file with an invalid or corrupted header (such as a header size of zero), leading to a SIGSEGV or possibly unspecified other impact.

5.5 2019-11-21 CVE-2019-19221

In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive.

7.5 2019-10-24 CVE-2019-18408

archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.

5.5 2019-04-22 CVE-2019-11463

A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.

6.5 2019-02-04 CVE-2019-1000020

libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.

6.5 2019-02-04 CVE-2019-1000019

libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.

6.5 2018-12-20 CVE-2018-1000880

libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.

6.5 2018-12-20 CVE-2018-1000879

libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file.

8.8 2018-12-20 CVE-2018-1000878

libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.

8.8 2018-12-20 CVE-2018-1000877

libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.

6.5 2017-09-17 CVE-2017-14503

libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.

7.5 2017-09-17 CVE-2017-14502

read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.

6.5 2017-09-17 CVE-2017-14501

An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.

6.5 2017-09-06 CVE-2017-14166

libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.

5.5 2017-04-30 CVE-2016-10350

The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.

5.5 2017-04-30 CVE-2016-10349

The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.

5.5 2017-04-03 CVE-2016-10209

The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.

7.5 2017-02-15 CVE-2016-8689

The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.

CWE : Common Weakness Enumeration

%idName
30% (18) CWE-125 Out-of-bounds Read
15% (9) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (7) CWE-476 NULL Pointer Dereference
10% (6) CWE-20 Improper Input Validation
8% (5) CWE-190 Integer Overflow or Wraparound
5% (3) CWE-416 Use After Free
3% (2) CWE-787 Out-of-bounds Write
3% (2) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (1) CWE-415 Double Free
1% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
1% (1) CWE-399 Resource Management Errors
1% (1) CWE-362 Race Condition
1% (1) CWE-193 Off-by-one Error
1% (1) CWE-189 Numeric Errors
1% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (1) CWE-19 Data Handling

Snort® IPS/IDS

Date Description
2016-05-25 libarchive RAR RestartModel out of bounds write attempt
RuleID : 39046 - Type : FILE-OTHER - Revision : 3
2016-05-25 libarchive RAR RestartModel out of bounds write attempt
RuleID : 39045 - Type : FILE-OTHER - Revision : 3
2016-05-25 libarchive mtree parse_device stack buffer overflow attempt
RuleID : 39035 - Type : FILE-OTHER - Revision : 3
2016-05-25 libarchive mtree parse_device stack buffer overflow attempt
RuleID : 39034 - Type : FILE-OTHER - Revision : 3
2016-04-28 libarchive zip_read_mac_metadata heap buffer overflow attempt
RuleID : 38628 - Type : FILE-OTHER - Revision : 3
2016-04-28 libarchive zip_read_mac_metadata heap buffer overflow attempt
RuleID : 38627 - Type : FILE-OTHER - Revision : 3

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7734354526.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-20c24949c0.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4360.nasl - Type: ACT_GATHER_INFO
2018-12-24 Name: The remote Debian host is missing a security update.
File: debian_DLA-1612.nasl - Type: ACT_GATHER_INFO
2018-11-30 Name: The remote Debian host is missing a security update.
File: debian_DLA-1600.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0010.nasl - Type: ACT_GATHER_INFO
2017-10-18 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201710-19.nasl - Type: ACT_GATHER_INFO
2017-09-11 Name: The remote Debian host is missing a security update.
File: debian_DLA-1092.nasl - Type: ACT_GATHER_INFO
2017-07-17 Name: The remote Fedora host is missing a security update.
File: fedora_2017-35e59a5ffb.nasl - Type: ACT_GATHER_INFO
2017-07-03 Name: The remote Debian host is missing a security update.
File: debian_DLA-1006.nasl - Type: ACT_GATHER_INFO
2017-05-01 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2016-1045.nasl - Type: ACT_GATHER_INFO
2017-04-24 Name: The remote Fedora host is missing a security update.
File: fedora_2017-55a8f10223.nasl - Type: ACT_GATHER_INFO
2017-03-10 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3225-1.nasl - Type: ACT_GATHER_INFO
2017-02-24 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL52697522.nasl - Type: ACT_GATHER_INFO
2017-02-24 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL35263486.nasl - Type: ACT_GATHER_INFO
2017-02-24 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL13074505.nasl - Type: ACT_GATHER_INFO
2017-02-10 Name: An application running on the remote web server is affected by multiple vulne...
File: splunk_652.nasl - Type: ACT_GATHER_INFO
2017-02-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-810.nasl - Type: ACT_GATHER_INFO
2017-01-30 Name: The remote Apple TV device is affected by multiple vulnerabilities.
File: appletv_10_1_1.nasl - Type: ACT_GATHER_INFO
2017-01-24 Name: The remote host is missing a macOS update that fixes multiple security vulner...
File: macos_10_12_3.nasl - Type: ACT_GATHER_INFO
2017-01-03 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-03.nasl - Type: ACT_GATHER_INFO
2016-12-12 Name: The remote Fedora host is missing a security update.
File: fedora_2016-dd2aa2b4a9.nasl - Type: ACT_GATHER_INFO
2016-12-12 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL35246595.nasl - Type: ACT_GATHER_INFO
2016-12-12 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL24036027.nasl - Type: ACT_GATHER_INFO
2016-12-06 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-1405.nasl - Type: ACT_GATHER_INFO