First published: Tue Jun 21 2016(Updated: )
An exploitable stack based buffer overflow vulnerability exists in the mtree parse_device functionality of libarchive. A specially crafted mtree file can cause a buffer overflow resulting in memory corruption/code execution. An attacker can send a malformed file to trigger this vulnerability. External references: <a href="http://www.talosintel.com/reports/TALOS-2016-0153/">http://www.talosintel.com/reports/TALOS-2016-0153/</a> Upstream fix: <a href="https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77">https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77</a>
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libarchive | <3.2.1 | 3.2.1 |
libarchive | <=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4301 is classified as a high severity vulnerability due to its potential for code execution through a stack-based buffer overflow.
To fix CVE-2016-4301, update libarchive to version 3.2.1 or later.
CVE-2016-4301 affects libarchive versions prior to 3.2.1.
CVE-2016-4301 is a stack-based buffer overflow vulnerability.
Yes, an attacker can exploit CVE-2016-4301 remotely by sending a specially crafted mtree file.