SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   libarchive Vendors:   libarchive
(Red Hat Issues Fix) libarchive Buffer Overflow and Use-After Free Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1026366
SecurityTracker URL:  http://securitytracker.com/id/1026366
CVE Reference:   CVE-2010-4666, CVE-2011-1777, CVE-2011-1778, CVE-2011-1779   (Links to External Site)
Date:  Dec 1 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.8.5
Description:   Several vulnerabilities were reported in libarchive. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted archive that, when processed by the target user or application, will execute arbitrary code on the target system. The code will run with the privileges of the target user or application.

A specially crafted CAB file can trigger a buffer overflow [CVE-2010-4666].

Several buffer overflows exist in 'archive_read_support_format_iso9660.c' [CVE-2011-1777].

A buffer overflow exists in the reading of tar archives [CVE-2011-1778].

Some use-after-free bugs exist [CVE-2011-1779].

Impact:   A remote user can create a file that, when processed by the target user or application, will execute arbitrary code on the target user's system.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2011-1507.html

Vendor URL:  code.google.com/p/libarchive/ (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Dec 1 2011 libarchive Buffer Overflow and Use-After Free Bugs Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Thu, 1 Dec 2011 16:54:13 +0000
Subject:  [RHSA-2011:1507-01] Moderate: libarchive security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: libarchive security update
Advisory ID:       RHSA-2011:1507-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1507.html
Issue date:        2011-12-01
CVE Names:         CVE-2011-1777 CVE-2011-1778 
=====================================================================

1. Summary:

Updated libarchive packages that fix two security issues are now available
for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The libarchive programming library can create and read several different
streaming archive formats, including GNU tar and cpio. It can also read ISO
9660 CD-ROM images.

Two heap-based buffer overflow flaws were discovered in libarchive. If a
user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image
or tar archive with an application using libarchive, it could cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2011-1777,
CVE-2011-1778)

All libarchive users should upgrade to these updated packages, which
contain backported patches to correct these issues. All running
applications using libarchive must be restarted for this update to take
effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

705849 - CVE-2010-4666 CVE-2011-1777 CVE-2011-1778 CVE-2011-1779 Libarchive multiple security issues

6. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm

x86_64:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-2.8.3-3.el6_1.x86_64.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm

x86_64:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

x86_64:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-2.8.3-3.el6_1.x86_64.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm

ppc64:
libarchive-2.8.3-3.el6_1.ppc.rpm
libarchive-2.8.3-3.el6_1.ppc64.rpm
libarchive-debuginfo-2.8.3-3.el6_1.ppc.rpm
libarchive-debuginfo-2.8.3-3.el6_1.ppc64.rpm

s390x:
libarchive-2.8.3-3.el6_1.s390.rpm
libarchive-2.8.3-3.el6_1.s390x.rpm
libarchive-debuginfo-2.8.3-3.el6_1.s390.rpm
libarchive-debuginfo-2.8.3-3.el6_1.s390x.rpm

x86_64:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-2.8.3-3.el6_1.x86_64.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm

ppc64:
libarchive-debuginfo-2.8.3-3.el6_1.ppc.rpm
libarchive-debuginfo-2.8.3-3.el6_1.ppc64.rpm
libarchive-devel-2.8.3-3.el6_1.ppc.rpm
libarchive-devel-2.8.3-3.el6_1.ppc64.rpm

s390x:
libarchive-debuginfo-2.8.3-3.el6_1.s390.rpm
libarchive-debuginfo-2.8.3-3.el6_1.s390x.rpm
libarchive-devel-2.8.3-3.el6_1.s390.rpm
libarchive-devel-2.8.3-3.el6_1.s390x.rpm

x86_64:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm

x86_64:
libarchive-2.8.3-3.el6_1.i686.rpm
libarchive-2.8.3-3.el6_1.x86_64.rpm
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libarchive-2.8.3-3.el6_1.src.rpm

i386:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm

x86_64:
libarchive-debuginfo-2.8.3-3.el6_1.i686.rpm
libarchive-debuginfo-2.8.3-3.el6_1.x86_64.rpm
libarchive-devel-2.8.3-3.el6_1.i686.rpm
libarchive-devel-2.8.3-3.el6_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-1777.html
https://www.redhat.com/security/data/cve/CVE-2011-1778.html
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO17EgXlSAg2UNWIIRAu+LAJ9rtKJWxIkRf/+aZDgwObTnWxFxpgCeOO0T
tXP21ivUeYDFufMwnu34kto=
=2Uad
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC