CVE-2016-4809
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
Known Affected Software
13 configuration(s) from 2 vendor(s)
linux
Version:
7
CPE:
cpe:2.3:o:oracle:linux:7:8:*:*:*:*:*:*
linux
Version:
6
CPE:
cpe:2.3:o:oracle:linux:6:10:*:*:*:*:*:*
enterprise_linux_workstation
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*
enterprise_linux_server
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*
enterprise_linux_hpc_node
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
enterprise_linux_hpc_node
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
enterprise_linux_server
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:x64:*
enterprise_linux_hpc_node_eus
Version:
7.2
CPE:
cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
enterprise_linux_desktop
Version:
7.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*
enterprise_linux_server_aus
Version:
7.2
CPE:
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
enterprise_linux_desktop
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*
enterprise_linux_server_eus
Version:
7.2
CPE:
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
enterprise_linux_workstation
Version:
6.0
CPE:
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*
This vulnerability affects 13 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://rhn.redhat.com/errata/RHSA-2016-1844.htmlcve@mitre.org Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1850.htmlcve@mitre.org Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3657cve@mitre.org
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlcve@mitre.org Third Party Advisory
-
http://www.securityfocus.com/bid/91813cve@mitre.org Third Party Advisory VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1347084cve@mitre.org Issue Tracking
-
https://github.com/libarchive/libarchive/commit/fd7e0c02cve@mitre.org Issue Tracking Patch
-
https://github.com/libarchive/libarchive/issues/705cve@mitre.org Issue Tracking Patch
-
https://security.gentoo.org/glsa/201701-03cve@mitre.org
-
http://rhn.redhat.com/errata/RHSA-2016-1844.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1850.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3657af854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/bid/91813af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1347084af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/libarchive/libarchive/commit/fd7e0c02af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch
-
https://github.com/libarchive/libarchive/issues/705af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch
-
https://security.gentoo.org/glsa/201701-03af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-20
Top 25 #14
Improper Input Validation
- Description
- The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- September 21, 2016
