First published: Wed Sep 21 2016(Updated: )
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux workstation | =7.0 | |
libarchive | <=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4302 is rated as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2016-4302, update libarchive to version 3.2.1 or later.
CVE-2016-4302 affects multiple versions of Red Hat Enterprise Linux and libarchive versions up to 3.2.0.
CVE-2016-4302 is a heap-based buffer overflow vulnerability.
CVE-2016-4302 can be exploited by remote attackers through specially crafted RAR files.