CVE-2015-8933

Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html - Third Party Advisory
References () http://www.debian.org/security/2016/dsa-3657 - () http://www.debian.org/security/2016/dsa-3657 -
References () http://www.openwall.com/lists/oss-security/2016/06/17/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/17/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/06/17/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/06/17/5 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/91421 - () http://www.securityfocus.com/bid/91421 -
References () http://www.ubuntu.com/usn/USN-3033-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3033-1 - Third Party Advisory
References () https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html - Third Party Advisory () https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html - Third Party Advisory
References () https://github.com/libarchive/libarchive/issues/548 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/libarchive/libarchive/issues/548 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201701-03 - () https://security.gentoo.org/glsa/201701-03 -

Information

Published : 2016-09-20 14:15

Updated : 2024-11-21 02:39


NVD link : CVE-2015-8933

Mitre link : CVE-2015-8933

CVE.ORG link : CVE-2015-8933


JSON object : View

Products Affected

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_desktop

canonical

  • ubuntu_linux

libarchive

  • libarchive
CWE
CWE-190

Integer Overflow or Wraparound