openSUSE Security Update : libarchive (openSUSE-2018-1366)

high Nessus Plugin ID 118872

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for libarchive fixes the following issues :

- CVE-2016-10209: The archive_wstring_append_from_mbs function in archive_string.c allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.
(bsc#1032089)

- CVE-2016-10349: The archive_le32dec function in archive_endian.h allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037008)

- CVE-2016-10350: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c allowed remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. (bsc#1037009)

- CVE-2017-14166: libarchive allowed remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
(bsc#1057514)

- CVE-2017-14501: An out-of-bounds read flaw existed in parse_file_info in archive_read_support_format_iso9660.c when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.
(bsc#1059139)

- CVE-2017-14502: read_header in archive_read_support_format_rar.c suffered from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header. (bsc#1059134)

- CVE-2017-14503: libarchive suffered from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
(bsc#1059100)

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected libarchive packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1032089

https://bugzilla.opensuse.org/show_bug.cgi?id=1037008

https://bugzilla.opensuse.org/show_bug.cgi?id=1037009

https://bugzilla.opensuse.org/show_bug.cgi?id=1057514

https://bugzilla.opensuse.org/show_bug.cgi?id=1059100

https://bugzilla.opensuse.org/show_bug.cgi?id=1059134

https://bugzilla.opensuse.org/show_bug.cgi?id=1059139

Plugin Details

Severity: High

ID: 118872

File Name: openSUSE-2018-1366.nasl

Version: 1.4

Type: local

Agent: unix

Published: 11/10/2018

Updated: 7/24/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2017-14502

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libarchive13-32bit, p-cpe:/a:novell:opensuse:libarchive13-debuginfo, p-cpe:/a:novell:opensuse:libarchive-debugsource, p-cpe:/a:novell:opensuse:libarchive-devel, p-cpe:/a:novell:opensuse:bsdtar, p-cpe:/a:novell:opensuse:bsdtar-debuginfo, p-cpe:/a:novell:opensuse:libarchive13, p-cpe:/a:novell:opensuse:libarchive13-debuginfo-32bit, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/9/2018

Reference Information

CVE: CVE-2016-10209, CVE-2016-10349, CVE-2016-10350, CVE-2017-14166, CVE-2017-14501, CVE-2017-14502, CVE-2017-14503