CVE-2016-8688

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.

References

http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html

http://www.openwall.com/lists/oss-security/2016/10/16/11

http://www.securityfocus.com/bid/93781

https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/

https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/

https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/

https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/

https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/

https://bugzilla.redhat.com/show_bug.cgi?id=1377923

https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca

https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html

https://security.gentoo.org/glsa/201701-03

Details

Source: MITRE

Published: 2017-02-15

Updated: 2018-11-30

Type: CWE-125

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
135650EulerOS Virtualization 3.0.2.2 : libarchive (EulerOS-SA-2020-1488)NessusHuawei Local Security Checks
high
134515EulerOS Virtualization for ARM 64 3.0.2.0 : libarchive (EulerOS-SA-2020-1226)NessusHuawei Local Security Checks
high
132139EulerOS 2.0 SP3 : libarchive (EulerOS-SA-2019-2604)NessusHuawei Local Security Checks
high
131871EulerOS 2.0 SP2 : libarchive (EulerOS-SA-2019-2379)NessusHuawei Local Security Checks
high
130664EulerOS 2.0 SP5 : libarchive (EulerOS-SA-2019-2202)NessusHuawei Local Security Checks
high
121677Photon OS 1.0: Libarchive PHSA-2017-0010NessusPhotonOS Local Security Checks
high
119289Debian DLA-1600-1 : libarchive security updateNessusDebian Local Security Checks
high
111859Photon OS 1.0: Binutils / Libarchive / Ntp PHSA-2017-0010 (deprecated)NessusPhotonOS Local Security Checks
critical
97660Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : libarchive vulnerabilities (USN-3225-1)NessusUbuntu Local Security Checks
high
97360F5 Networks BIG-IP : libarchive vulnerability (K35263486)NessusF5 Networks Local Security Checks
medium
97100Splunk Enterprise < 5.0.17 / 6.0.13 / 6.1.12 / 6.2.13 / 6.3.9 / 6.4.5 / 6.5.2 or Splunk Light < 6.5.2 Multiple VulnerabilitiesNessusCGI abuses
high
96234GLSA-201701-03 : libarchive: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
95559openSUSE Security Update : libarchive (openSUSE-2016-1405)NessusSuSE Local Security Checks
high
95558openSUSE Security Update : libarchive (openSUSE-2016-1404)NessusSuSE Local Security Checks
high
95367SUSE SLED12 / SLES12 Security Update : libarchive (SUSE-SU-2016:2911-1)NessusSuSE Local Security Checks
high
94102Debian DLA-661-1 : libarchive security updateNessusDebian Local Security Checks
high