Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
http://blog.talosintel.com/2016/06/the-poisoned-archives.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1348444
http://rhn.redhat.com/errata/RHSA-2016-1844.html
http://www.debian.org/security/2016/dsa-3657
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91331
http://www.talosintel.com/reports/TALOS-2016-0154/
https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700
Source: MITRE
Published: 2016-09-21
Updated: 2017-11-04
Type: CWE-119
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH
OR
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:* versions up to 3.2.0 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
124794 | EulerOS Virtualization 3.0.1.0 : libarchive (EulerOS-SA-2019-1470) | Nessus | Huawei Local Security Checks | high |
121677 | Photon OS 1.0: Libarchive PHSA-2017-0010 | Nessus | PhotonOS Local Security Checks | high |
111859 | Photon OS 1.0: Binutils / Libarchive / Ntp PHSA-2017-0010 (deprecated) | Nessus | PhotonOS Local Security Checks | high |
99808 | EulerOS 2.0 SP1 : libarchive (EulerOS-SA-2016-1045) | Nessus | Huawei Local Security Checks | high |
96234 | GLSA-201701-03 : libarchive: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
93744 | Amazon Linux AMI : libarchive (ALAS-2016-743) | Nessus | Amazon Linux Local Security Checks | high |
93541 | CentOS 7 : libarchive (CESA-2016:1844) | Nessus | CentOS Local Security Checks | high |
93454 | Scientific Linux Security Update : libarchive on SL7.x x86_64 (20160912) | Nessus | Scientific Linux Local Security Checks | high |
93450 | RHEL 7 : libarchive (RHSA-2016:1844) | Nessus | Red Hat Local Security Checks | high |
93446 | Oracle Linux 7 : libarchive (ELSA-2016-1844) | Nessus | Oracle Linux Local Security Checks | high |
93238 | Debian DSA-3657-1 : libarchive - security update | Nessus | Debian Local Security Checks | medium |
93185 | SUSE SLED12 / SLES12 Security Update : libarchive (SUSE-SU-2016:1909-1) | Nessus | SuSE Local Security Checks | medium |
92975 | openSUSE Security Update : libarchive (openSUSE-2016-969) | Nessus | SuSE Local Security Checks | medium |
92500 | Debian DLA-554-1 : libarchive security update | Nessus | Debian Local Security Checks | medium |
92312 | Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : libarchive vulnerabilities (USN-3033-1) | Nessus | Ubuntu Local Security Checks | medium |
91791 | FreeBSD : libarchive -- multiple vulnerabilities (4a0d9b53-395d-11e6-b3c8-14dae9d210b8) | Nessus | FreeBSD Local Security Checks | medium |