First published: Tue Jun 21 2016(Updated: )
An exploitable heap overflow vulnerability exists in the 7zip read_SubStreamsInfo functionality of libarchive. A specially crafted 7zip file can cause a integer overflow resulting in memory corruption that can lead to code execution. An attacker can send a malformed file to trigger this vulnerability. External references: <a href="http://www.talosintel.com/reports/TALOS-2016-0152/">http://www.talosintel.com/reports/TALOS-2016-0152/</a> Upstream fix: <a href="https://github.com/libarchive/libarchive/commit/e79ef306afe332faf22e9b442a2c6b59cb175573">https://github.com/libarchive/libarchive/commit/e79ef306afe332faf22e9b442a2c6b59cb175573</a>
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libarchive | <3.2.1 | 3.2.1 |
Oracle Libarchive | <=3.2.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4300 is categorized as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-4300, update the libarchive package to version 3.2.1 or later.
CVE-2016-4300 is caused by a heap overflow in the read_SubStreamsInfo functionality of libarchive when processing specially crafted 7zip files.
CVE-2016-4300 affects libarchive versions up to 3.2.0 and specific versions of Red Hat Enterprise Linux 7.0 and 7.2.
Yes, an attacker can exploit CVE-2016-4300 remotely by sending a specially crafted 7zip file.