Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891600
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-1600-1)
Summary:The remote host is missing an update for the Debian 'libarchive' package(s) announced via the DLA-1600-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libarchive' package(s) announced via the DLA-1600-1 advisory.

Vulnerability Insight:
Multiple security vulnerabilities were found in libarchive, a multi-format archive and compression library. Heap-based buffer over-reads, NULL pointer dereferences and out-of-bounds reads allow remote attackers to cause a denial-of-service (application crash) via specially crafted archive files.

For Debian 8 Jessie, these problems have been fixed in version 3.1.2-11+deb8u4.

We recommend that you upgrade your libarchive packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libarchive' package(s) on Debian 8.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-8915
BugTraq ID: 91298
http://www.securityfocus.com/bid/91298
https://security.gentoo.org/glsa/201701-03
https://blog.fuzzing-project.org/47-Many-invalid-memory-access-issues-in-libarchive.html
https://github.com/libarchive/libarchive/issues/503
https://lists.debian.org/debian-lts-announce/2018/11/msg00037.html
http://www.openwall.com/lists/oss-security/2016/06/17/2
http://www.openwall.com/lists/oss-security/2016/06/17/5
Common Vulnerability Exposure (CVE) ID: CVE-2016-10209
BugTraq ID: 97327
http://www.securityfocus.com/bid/97327
Debian Security Information: DSA-4360 (Google Search)
https://www.debian.org/security/2018/dsa-4360
https://usn.ubuntu.com/3736-1/
Common Vulnerability Exposure (CVE) ID: CVE-2016-10349
BugTraq ID: 100347
http://www.securityfocus.com/bid/100347
https://security.gentoo.org/glsa/201710-19
https://github.com/libarchive/libarchive/issues/834
Common Vulnerability Exposure (CVE) ID: CVE-2016-10350
https://github.com/libarchive/libarchive/issues/835
Common Vulnerability Exposure (CVE) ID: CVE-2016-8687
BugTraq ID: 93781
http://www.securityfocus.com/bid/93781
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-stack-based-buffer-overflow-in-bsdtar_expand_char-util-c/
https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
http://www.openwall.com/lists/oss-security/2016/10/16/11
http://www.securitytracker.com/id/1037668
SuSE Security Announcement: openSUSE-SU-2016:3002 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-8688
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/
Common Vulnerability Exposure (CVE) ID: CVE-2016-8689
https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-read_header-archive_read_support_format_7zip-c/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14166
https://security.gentoo.org/glsa/201908-11
https://blogs.gentoo.org/ago/2017/09/06/libarchive-heap-based-buffer-overflow-in-xml_data-archive_read_support_format_xar-c/
https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71
Common Vulnerability Exposure (CVE) ID: CVE-2017-14501
https://bugs.debian.org/875966
https://github.com/libarchive/libarchive/issues/949
Common Vulnerability Exposure (CVE) ID: CVE-2017-14502
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=573
https://bugs.debian.org/875974
https://github.com/libarchive/libarchive/commit/5562545b5562f6d12a4ef991fae158bf4ccf92b6
https://usn.ubuntu.com/3859-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14503
https://bugs.debian.org/875960
https://github.com/libarchive/libarchive/issues/948
RedHat Security Advisories: RHSA-2019:2298
https://access.redhat.com/errata/RHSA-2019:2298
RedHat Security Advisories: RHSA-2019:3698
https://access.redhat.com/errata/RHSA-2019:3698
Common Vulnerability Exposure (CVE) ID: CVE-2017-5601
BugTraq ID: 95837
http://www.securityfocus.com/bid/95837
https://github.com/libarchive/libarchive/commit/98dcbbf0bf4854bf987557e55e55fff7abbf3ea9
https://secunia.com/secunia_research/2017-3/
http://www.securitytracker.com/id/1037974
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.