Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/06/17/2 | Mailing List Third Party Advisory |
http://www.ubuntu.com/usn/USN-3033-1 | Third Party Advisory |
https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/06/17/5 | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html | Third Party Advisory |
https://github.com/libarchive/libarchive/issues/548 | Exploit Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/91421 | |
https://security.gentoo.org/glsa/201701-03 | |
http://www.debian.org/security/2016/dsa-3657 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2016-09-20 07:15
Updated : 2017-11-03 18:29
NVD link : CVE-2015-8933
Mitre link : CVE-2015-8933
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
suse
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
- linux_enterprise_server
canonical
- ubuntu_linux
libarchive
- libarchive