Page 4 of 66 results (0.013 seconds)

CVSS: 8.8EPSS: 0%CPEs: 14EXPL: 0

libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive. libarchive, con el commit con ID 416694915449219d505531b1096384f3237dd6cc y siguientes (desde la v3.1.0) contiene una vulnerabilidad CWE-416: uso de memoria previamente liberada en el descodificador RAR (libarchive/archive_read_support_format_rar.c) que puede resultar en un cierre inesperado/denegación de servicio. Se desconoce si se puede ejecutar código de forma remota. El ataque parece ser explotable si una víctima abre un archivo RAR especialmente manipulado. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html http://www.securityfocus.com/bid/106324 https://access.redhat.com/errata/RHSA-2019:2298 https://access.redhat.com/errata/RHSA-2019:3698 https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909 https://github.com/libarchive/libarchive/pull/1105 https://gith • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted archive file. libarchive, con el commit con ID 379867ecb330b3a952fb7bfa7bffb7bbd5547205 y siguientes (desde la v3.3.0) contiene una vulnerabilidad CWE-476: desreferencia de puntero NULL en el analizador ACL (libarchive/archive_acl.c), en archive_acl_from_text_l(), que puede resultar en un cierre inesperado/denegación de servicio (DoS). El ataque parece ser explotable si una víctima abre un archivo comprimido especialmente manipulado. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html http://www.securityfocus.com/bid/106324 https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909 https://github.com/libarchive/libarchive/pull/1105 https://github.com/libarchive/libarchive/pull/1105/commits/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. Existe un error por un paso en read_header de archive_read_support_format_rar.c en libarchive 3.3.2 para los nombres UTF-16 en archivos RAR, lo que provoca una lectura fuera de límites en archive_read_format_rar_read_header. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=573 https://bugs.debian.org/875974 https://github.com/libarchive/libarchive/commit/5562545b5562f6d12a4ef991fae158bf4ccf92b6 https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html https://security.gentoo.org/glsa/201908-11 https://usn.ubuntu.com/3859-1 https://www.debian.org/security/2018/dsa-4360 • CWE-125: Out-of-bounds Read CWE-193: Off-by-one Error •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header. Existe un error de lectura fuera de límites en parse_file_info de archive_read_support_format_iso9660.c en libarchive 3.3.2 cuando se extraen archivos .iso iso9660 especialmente manipulados. Esto está relacionado con archive_read_format_iso9660_read_header. • https://bugs.debian.org/875966 https://github.com/libarchive/libarchive/issues/949 https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html https://security.gentoo.org/glsa/201908-11 https://usn.ubuntu.com/3736-1 https://www.debian.org/security/2018/dsa-4360 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. libarchive 3.3.2 sufre una lectura fuera de límites en lha_read_data_none() en archive_read_support_format_lha.c cuando se extraen archivos lha especialmente manipulados. Esto está relacionado con lha_crc16. • https://access.redhat.com/errata/RHSA-2019:2298 https://access.redhat.com/errata/RHSA-2019:3698 https://bugs.debian.org/875960 https://github.com/libarchive/libarchive/issues/948 https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html https://security.gentoo.org/glsa/201908-11 https://usn.ubuntu.com/3736-1 https://www.debian.org/security/2018/dsa-4360 https://access.redhat.com/security/cve/CVE-2017-14503 https://bugzilla.redhat.com/show_bug.cgi?id=149444 • CWE-125: Out-of-bounds Read •