Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8916

Опубликовано: 17 июн. 2016
Источник: redhat
CVSS3: 3.7
CVSS2: 3.5

Описание

bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.

A vulnerability was found in libarchive. A specially crafted RAR file could cause the application dereference a NULL pointer, leading to a crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libarchiveNot affected
Red Hat Enterprise Linux 7libarchiveFixedRHSA-2016:184412.09.2016

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-228->CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1348412libarchive: NULL pointer access in RAR parser through bsdtar

3.7 Low

CVSS3

3.5 Low

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 9 лет назад

bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.

CVSS3: 6.5
nvd
почти 9 лет назад

bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.

CVSS3: 6.5
debian
почти 9 лет назад

bsdtar in libarchive before 3.2.0 returns a success code without filli ...

CVSS3: 6.5
github
около 3 лет назад

bsdtar in libarchive before 3.2.0 returns a success code without filling the entry when the header is a "split file in multivolume RAR," which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted rar file.

oracle-oval
почти 9 лет назад

ELSA-2016-1844: libarchive security update (IMPORTANT)

3.7 Low

CVSS3

3.5 Low

CVSS2