First published: Wed Feb 06 2019(Updated: )
libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file. References: <a href="https://github.com/libarchive/libarchive/pull/1120/commits/8312eaa576014cd9b965012af51bc1f967b12423">https://github.com/libarchive/libarchive/pull/1120/commits/8312eaa576014cd9b965012af51bc1f967b12423</a> <a href="https://github.com/libarchive/libarchive/pull/1120">https://github.com/libarchive/libarchive/pull/1120</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Libarchive | >=2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1672888 is categorized as a Denial of Service (DoS) vulnerability.
To fix REDHAT-BUG-1672888, you should upgrade to libarchive version 2.8.0 or later.
REDHAT-BUG-1672888 is caused by an infinite loop vulnerability in the ISO9660 parser.
Versions of libarchive prior to 2.8.0 are affected by REDHAT-BUG-1672888.
REDHAT-BUG-1672888 is classified as a CWE-835: Loop with Unreachable Exit Condition vulnerability.