Computer Security
[EN] securityvulns.ru no-pyccku


libarchive multiple security vulnerabilities
Published:13.07.2007
Source:
SecurityVulns ID:7934
Type:library
Threat Level:
5/10
Description:Memory corruption, buffer overflow, NULL pointer dereference.
Affected:FREEBSD : FreeBSD 6.1
 FREEBSD : FreeBSD 5.5
 FREEBSD : FreeBSD 6.2
CVE:CVE-2007-3645 (archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (crash) via (1) an end-of-file condition within a tar header that follows a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive, which results in a NULL pointer dereference, a different issue than CVE-2007-3644.)
 CVE-2007-3644 (archive_read_support_format_tar.c in libarchive before 2.2.4 allows user-assisted remote attackers to cause a denial of service (infinite loop) via (1) an end-of-file condition within a pax extension header or (2) a malformed pax extension header in an (a) PAX or a (b) TAR archive.)
 CVE-2007-3641 (archive_read_support_format_tar.c in libarchive before 2.2.4 does not properly compute the length of a certain buffer when processing a malformed pax extension header, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PAX or (2) TAR archive that triggers a buffer overflow.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-07:05.libarchive (13.07.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod