Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4302

Опубликовано: 21 сент. 2016
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libarchivefixed3.2.1-1package

Примечания

  • http://blog.talosintel.com/2016/06/the-poisoned-archives.html

  • http://www.talosintel.com/reports/TALOS-2016-0154/

  • https://github.com/libarchive/libarchive/issues/719

  • Fixed by: https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700 (v3.2.1)

EPSS

Процентиль: 84%
0.02337
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 9 лет назад

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

CVSS3: 7.7
redhat
около 9 лет назад

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

CVSS3: 7.8
nvd
почти 9 лет назад

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

CVSS3: 7.8
github
около 3 лет назад

Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.

suse-cvrf
около 9 лет назад

Security update for libarchive

EPSS

Процентиль: 84%
0.02337
Низкий