First published: Wed Sep 06 2017(Updated: )
libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/libarchive | <3.1.2-7ubuntu2.6 | 3.1.2-7ubuntu2.6 |
ubuntu/libarchive | <3.2.2-3.1 | 3.2.2-3.1 |
ubuntu/libarchive | <3.1.2-11ubuntu0.16.04.4 | 3.1.2-11ubuntu0.16.04.4 |
debian/libarchive | 3.4.3-2+deb11u1 3.6.2-1+deb12u1 3.7.4-1 | |
libarchive | =3.3.2 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14166 has a high severity due to its potential to cause denial of service by crashing the application.
CVE-2017-14166 affects libarchive version 3.3.2 and prior versions that mishandle crafted xar archives.
To fix CVE-2017-14166, update libarchive to a version higher than 3.3.2, such as 3.4.3 or later.
CVE-2017-14166 enables remote attackers to execute a denial of service attack through manipulated xar archives.
There is no official workaround for CVE-2017-14166; updating to a patched version is the recommended solution.