Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-1000888
HistoryDec 28, 2018 - 12:00 a.m.

CVE-2018-1000888

2018-12-2800:00:00
ubuntu.com
ubuntu.com
9

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

81.0%

PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915
vulnerability in the Archive_Tar class. There are several file operations
with $v_header['filename'] as parameter (such as file_exists, is_file,
is_dir, etc). When extract is called without a specific prefix path, we can
trigger unserialization by crafting a tar file with
phar://[path_to_malicious_phar_file] as path. Object injection can be
used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar
class itself. With Archive_Tar object injection, arbitrary file deletion
can occur because @unlink($this->_temp_tarname) is called. If another
class with useful gadget is loaded, it may possible to cause remote code
execution that can result in files being deleted or possibly modified. This
vulnerability appears to have been fixed in 1.4.4.

Bugs

Notes

Author Note
mdeslaur the 1.4.4 release broke symlinks, see: https://pear.php.net/bugs/bug.php?id=23788 1.4.5 was released with symlink fix the regression is unrelated to the fix for this CVE
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchphp-pear< 1:1.10.5+submodules+notgz-1ubuntu1.18.04.1UNKNOWN
ubuntu18.10noarchphp-pear< 1:1.10.5+submodules+notgz-1ubuntu1.18.10.1UNKNOWN
ubuntu16.04noarchphp-pear< 1:1.10.1+submodules+notgz-6ubuntu0.1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.007 Low

EPSS

Percentile

81.0%