Lucene search

K
gentooGentoo FoundationGLSA-200708-03
HistoryAug 08, 2007 - 12:00 a.m.

libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulnerabilities

2007-08-0800:00:00
Gentoo Foundation
security.gentoo.org
13

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.103 Low

EPSS

Percentile

94.9%

Background

libarchive is a library for manipulating different streaming archive formats, including certain tar variants, several cpio formats, and both BSD and GNU ar variants.

Description

CPNI, CERT-FI, Tim Kientzle, and Colin Percival reported a buffer overflow (CVE-2007-3641), an infinite loop (CVE-2007-3644), and a NULL pointer dereference (CVE-2007-3645) within the processing of archives having corrupted PaX extension headers.

Impact

An attacker can trick a user or automated system to process an archive with malformed PaX extension headers into execute arbitrary code, crash an application using the library, or cause a high CPU load.

Workaround

There is no known workaround at this time.

Resolution

All libarchive or bsdtar users should upgrade to the latest libarchive version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/libarchive-2.2.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/libarchive< 2.2.4UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.103 Low

EPSS

Percentile

94.9%