The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-1850.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-1844.html | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1362601 | Issue Tracking Third Party Advisory VDB Entry |
https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f | Exploit Technical Description |
https://github.com/libarchive/libarchive/issues/746 | Exploit Patch |
https://access.redhat.com/errata/RHSA-2016:1853 | Third Party Advisory |
https://github.com/libarchive/libarchive/commit/dfd6b54ce33960e420fb206d8872fb759b577ad9 | Patch |
http://www.openwall.com/lists/oss-security/2016/08/09/2 | Exploit Technical Description |
https://access.redhat.com/errata/RHSA-2016:1852 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | Third Party Advisory |
http://www.securityfocus.com/bid/93165 | |
https://security.gentoo.org/glsa/201701-03 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2016-09-21 07:25
Updated : 2019-12-27 08:08
NVD link : CVE-2016-5418
Mitre link : CVE-2016-5418
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_server_aus
- enterprise_linux_workstation
- openshift
- enterprise_linux_server_eus
- enterprise_linux_hpc_node_eus
- enterprise_linux_server
libarchive
- libarchive
oracle
- linux