Summary
Detail | |||
---|---|---|---|
Vendor | Libarchive | First view | 2013-09-30 |
Product | Libarchive | Last view | 2023-05-29 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2023-05-29 | CVE-2023-30571 | Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories. |
9.8 | 2022-11-22 | CVE-2022-36227 | In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution." |
7.8 | 2022-08-23 | CVE-2021-31566 | An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system. |
7.8 | 2022-08-23 | CVE-2021-23177 | An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges. |
6.5 | 2022-03-28 | CVE-2022-26280 | Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init. |
6.5 | 2021-07-20 | CVE-2021-36976 | libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block). |
6.5 | 2020-10-15 | CVE-2020-21674 | Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected. |
8.8 | 2020-02-20 | CVE-2020-9308 | archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to unpack a RAR5 file with an invalid or corrupted header (such as a header size of zero), leading to a SIGSEGV or possibly unspecified other impact. |
5.5 | 2019-11-21 | CVE-2019-19221 | In Libarchive 3.4.0, archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call. For example, bsdtar crashes via a crafted archive. |
7.5 | 2019-10-24 | CVE-2019-18408 | archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol. |
5.5 | 2019-04-22 | CVE-2019-11463 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected. |
6.5 | 2019-02-04 | CVE-2019-1000020 | libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file. |
6.5 | 2019-02-04 | CVE-2019-1000019 | libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file. |
6.5 | 2018-12-20 | CVE-2018-1000880 | libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file. |
6.5 | 2018-12-20 | CVE-2018-1000879 | libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file. |
8.8 | 2018-12-20 | CVE-2018-1000878 | libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive. |
8.8 | 2018-12-20 | CVE-2018-1000877 | libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive. |
6.5 | 2017-09-17 | CVE-2017-14503 | libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. |
7.5 | 2017-09-17 | CVE-2017-14502 | read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. |
6.5 | 2017-09-17 | CVE-2017-14501 | An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. |
6.5 | 2017-09-06 | CVE-2017-14166 | libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c. |
5.5 | 2017-04-30 | CVE-2016-10350 | The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. |
5.5 | 2017-04-30 | CVE-2016-10349 | The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. |
5.5 | 2017-04-03 | CVE-2016-10209 | The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file. |
7.5 | 2017-02-15 | CVE-2016-8689 | The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
30% (18) | CWE-125 | Out-of-bounds Read |
15% (9) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
11% (7) | CWE-476 | NULL Pointer Dereference |
10% (6) | CWE-20 | Improper Input Validation |
8% (5) | CWE-190 | Integer Overflow or Wraparound |
5% (3) | CWE-416 | Use After Free |
3% (2) | CWE-787 | Out-of-bounds Write |
3% (2) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
1% (1) | CWE-415 | Double Free |
1% (1) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
1% (1) | CWE-399 | Resource Management Errors |
1% (1) | CWE-362 | Race Condition |
1% (1) | CWE-193 | Off-by-one Error |
1% (1) | CWE-189 | Numeric Errors |
1% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (1) | CWE-19 | Data Handling |
Snort® IPS/IDS
Date | Description |
---|---|
2016-05-25 | libarchive RAR RestartModel out of bounds write attempt RuleID : 39046 - Type : FILE-OTHER - Revision : 3 |
2016-05-25 | libarchive RAR RestartModel out of bounds write attempt RuleID : 39045 - Type : FILE-OTHER - Revision : 3 |
2016-05-25 | libarchive mtree parse_device stack buffer overflow attempt RuleID : 39035 - Type : FILE-OTHER - Revision : 3 |
2016-05-25 | libarchive mtree parse_device stack buffer overflow attempt RuleID : 39034 - Type : FILE-OTHER - Revision : 3 |
2016-04-28 | libarchive zip_read_mac_metadata heap buffer overflow attempt RuleID : 38628 - Type : FILE-OTHER - Revision : 3 |
2016-04-28 | libarchive zip_read_mac_metadata heap buffer overflow attempt RuleID : 38627 - Type : FILE-OTHER - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7734354526.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-20c24949c0.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4360.nasl - Type: ACT_GATHER_INFO |
2018-12-24 | Name: The remote Debian host is missing a security update. File: debian_DLA-1612.nasl - Type: ACT_GATHER_INFO |
2018-11-30 | Name: The remote Debian host is missing a security update. File: debian_DLA-1600.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0010.nasl - Type: ACT_GATHER_INFO |
2017-10-18 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201710-19.nasl - Type: ACT_GATHER_INFO |
2017-09-11 | Name: The remote Debian host is missing a security update. File: debian_DLA-1092.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-35e59a5ffb.nasl - Type: ACT_GATHER_INFO |
2017-07-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1006.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2016-1045.nasl - Type: ACT_GATHER_INFO |
2017-04-24 | Name: The remote Fedora host is missing a security update. File: fedora_2017-55a8f10223.nasl - Type: ACT_GATHER_INFO |
2017-03-10 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3225-1.nasl - Type: ACT_GATHER_INFO |
2017-02-24 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL52697522.nasl - Type: ACT_GATHER_INFO |
2017-02-24 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL35263486.nasl - Type: ACT_GATHER_INFO |
2017-02-24 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL13074505.nasl - Type: ACT_GATHER_INFO |
2017-02-10 | Name: An application running on the remote web server is affected by multiple vulne... File: splunk_652.nasl - Type: ACT_GATHER_INFO |
2017-02-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-810.nasl - Type: ACT_GATHER_INFO |
2017-01-30 | Name: The remote Apple TV device is affected by multiple vulnerabilities. File: appletv_10_1_1.nasl - Type: ACT_GATHER_INFO |
2017-01-24 | Name: The remote host is missing a macOS update that fixes multiple security vulner... File: macos_10_12_3.nasl - Type: ACT_GATHER_INFO |
2017-01-03 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201701-03.nasl - Type: ACT_GATHER_INFO |
2016-12-12 | Name: The remote Fedora host is missing a security update. File: fedora_2016-dd2aa2b4a9.nasl - Type: ACT_GATHER_INFO |
2016-12-12 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL35246595.nasl - Type: ACT_GATHER_INFO |
2016-12-12 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL24036027.nasl - Type: ACT_GATHER_INFO |
2016-12-06 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2016-1405.nasl - Type: ACT_GATHER_INFO |