CVE-2015-8932
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The compress_bidder_init function in archive_read_support_filter_compress.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file, which triggers an invalid left shift.
Known Affected Software
9 configuration(s) from 3 vendor(s)
ubuntu_linux
Version:
14.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
ubuntu_linux
Version:
16.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
ubuntu_linux
Version:
15.10
CPE:
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
ubuntu_linux
Version:
12.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
debian_linux
Version:
8.0
CPE:
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian_linux
Version:
7.0
CPE:
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
linux_enterprise_server
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*
linux_enterprise_desktop
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*
linux_enterprise_software_development_kit
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
This vulnerability affects 9 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.htmlcve@mitre.org Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1844.htmlcve@mitre.org
-
http://rhn.redhat.com/errata/RHSA-2016-1850.htmlcve@mitre.org
-
http://www.debian.org/security/2016/dsa-3657cve@mitre.org
-
http://www.openwall.com/lists/oss-security/2016/06/17/2cve@mitre.org Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/17/5cve@mitre.org Mailing List Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlcve@mitre.org
-
http://www.securityfocus.com/bid/91424cve@mitre.org
-
http://www.ubuntu.com/usn/USN-3033-1cve@mitre.org Third Party Advisory
-
https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.htmlcve@mitre.org Third Party Advisory
-
https://github.com/libarchive/libarchive/issues/547cve@mitre.org Exploit Issue Tracking Patch Third Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2015-8932cve@mitre.org Third Party Advisory
-
https://security.gentoo.org/glsa/201701-03cve@mitre.org
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1844.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2016-1850.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.debian.org/security/2016/dsa-3657af854a3a-2127-422b-91ae-364da2661108
-
http://www.openwall.com/lists/oss-security/2016/06/17/2af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/17/5af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/91424af854a3a-2127-422b-91ae-364da2661108
-
http://www.ubuntu.com/usn/USN-3033-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://github.com/libarchive/libarchive/issues/547af854a3a-2127-422b-91ae-364da2661108 Exploit Issue Tracking Patch Third Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2015-8932af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.gentoo.org/glsa/201701-03af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-20
Top 25 #14
Improper Input Validation
- Description
- The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- September 20, 2016
