Описание
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.2.1-1 |
esm-infra-legacy/trusty | not-affected | 3.1.2-7ubuntu2.3 |
esm-infra/xenial | not-affected | 3.1.2-11ubuntu0.16.04.2 |
precise | released | 3.0.3-6ubuntu1.3 |
trusty | released | 3.1.2-7ubuntu2.3 |
trusty/esm | not-affected | 3.1.2-7ubuntu2.3 |
upstream | needed | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | released | 3.1.2-11ubuntu0.15.10.2 |
Показывать по
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
Heap-based buffer overflow in the parse_codes function in archive_read ...
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
EPSS
6.8 Medium
CVSS2
7.8 High
CVSS3