Mandriva Linux Security Advisory : libarchive (MDVSA-2013:147)

Medium Nessus Plugin ID 66157

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability has been found and corrected in libarchive :

Fabian Yamaguchi reported a read buffer overflow flaw in libarchive on 64-bit systems where sizeof(size_t) is equal to 8. In the archive_write_zip_data() function in libarchive/ archive_write_set_format_zip.c, the 's' parameter is of type size_t (64 bit, unsigned) and is cast to a 64 bit signed integer. If 's' is larger than MAX_INT, it will not be set to 'zip->remaining_data_bytes' even though it is larger than 'zip->remaining_data_bytes', which leads to a buffer overflow when calling deflate(). This can lead to a segfault in an application that uses libarchive to create ZIP archives (CVE-2013-0211).

The updated packages have been patched to correct this issue.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 66157

File Name: mandriva_MDVSA-2013-147.nasl

Version: 1.9

Type: local

Published: 2013/04/20

Updated: 2021/01/06

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.6

CVSS v2.0

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:bsdcpio, p-cpe:/a:mandriva:linux:bsdtar, p-cpe:/a:mandriva:linux:lib64archive-devel, p-cpe:/a:mandriva:linux:lib64archive12, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/19

Reference Information

CVE: CVE-2013-0211

BID: 58926

MDVSA: 2013:147

MGASA: 2013-0119