7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.009 Low
EPSS
Percentile
82.4%
Package : libarchive
Version : 3.0.4-3+wheezy5
CVE ID : CVE-2016-8687 CVE-2016-8688 CVE-2016-8689
Debian Bug : 840934 840935 840936
Agostino Sarubbo of Gentoo discovered several security vulnerabilities
in libarchive, a multi-format archive and compression library. An
attacker could take advantage of these flaws to cause a buffer overflow
or an out of bounds read using a carefully crafted input file.
CVE-2016-8687
Agostino Sarubbo of Gentoo discovered a possible stack-based buffer
overflow when printing a filename in bsdtar_expand_char() of util.c.
CVE-2016-8688
Agostino Sarubbo of Gentoo discovered a possible out of bounds read
when parsing multiple long lines in bid_entry() and detect_form() of
archive_read_support_format_mtree.c.
CVE-2016-8689
Agostino Sarubbo of Gentoo discovered a possible heap-based buffer
overflow when reading corrupted 7z files in read_Header() of
archive_read_support_format_7zip.c.
For Debian 7 "Wheezy", these problems have been fixed in version
3.0.4-3+wheezy5.
We recommend that you upgrade your libarchive packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Jonas Meurer
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | all | libarchive | < 3.0.4-3+wheezy5 | libarchive_3.0.4-3+wheezy5_all.deb |
Debian | 7 | i386 | libarchive12 | < 3.0.4-3+wheezy5 | libarchive12_3.0.4-3+wheezy5_i386.deb |
Debian | 7 | armhf | libarchive12 | < 3.0.4-3+wheezy5 | libarchive12_3.0.4-3+wheezy5_armhf.deb |
Debian | 8 | armhf | bsdcpio | < 3.1.2-11+deb8u4 | bsdcpio_3.1.2-11+deb8u4_armhf.deb |
Debian | 8 | amd64 | libarchive-dev | < 3.1.2-11+deb8u4 | libarchive-dev_3.1.2-11+deb8u4_amd64.deb |
Debian | 7 | amd64 | libarchive-dev | < 3.0.4-3+wheezy5 | libarchive-dev_3.0.4-3+wheezy5_amd64.deb |
Debian | 8 | i386 | bsdtar | < 3.1.2-11+deb8u4 | bsdtar_3.1.2-11+deb8u4_i386.deb |
Debian | 8 | i386 | libarchive-dev | < 3.1.2-11+deb8u4 | libarchive-dev_3.1.2-11+deb8u4_i386.deb |
Debian | 7 | i386 | libarchive-dev | < 3.0.4-3+wheezy5 | libarchive-dev_3.0.4-3+wheezy5_i386.deb |
Debian | 8 | all | libarchive | < 3.1.2-11+deb8u4 | libarchive_3.1.2-11+deb8u4_all.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.009 Low
EPSS
Percentile
82.4%