First published: Fri Apr 13 2012(Updated: )
Multiple buffer overflows in the (1) heap_add_entry and (2) relocate_dir functions in archive_read_support_format_iso9660.c in libarchive through 2.8.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ISO9660 image.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD libarchive | <=2.8.5 | |
FreeBSD libarchive | =2.0 | |
FreeBSD libarchive | =2.1 | |
FreeBSD libarchive | =2.2 | |
FreeBSD libarchive | =2.2.3 | |
FreeBSD libarchive | =2.3 | |
FreeBSD libarchive | =2.4 | |
FreeBSD libarchive | =2.5 | |
FreeBSD libarchive | =2.6 | |
FreeBSD libarchive | =2.6.1 | |
FreeBSD libarchive | =2.6.2 | |
FreeBSD libarchive | =2.7.0 | |
FreeBSD libarchive | =2.7.1 | |
FreeBSD libarchive | =2.8.0 | |
FreeBSD libarchive | =2.8.1 | |
FreeBSD libarchive | =2.8.2 | |
FreeBSD libarchive | =2.8.3 | |
FreeBSD libarchive | =2.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1777 has a severity level that could lead to denial of service or potentially arbitrary code execution.
To fix CVE-2011-1777, upgrade to a version of libarchive that is greater than 2.8.5.
CVE-2011-1777 affects multiple versions of libarchive up to 2.8.5, including versions 2.0 through 2.8.5.
CVE-2011-1777 can be exploited by attackers using crafted ISO9660 images to cause application crashes or execute malicious code.
Yes, a patch for CVE-2011-1777 is included in updates to libarchive after version 2.8.5.