FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

libarchive -- multiple vulnerabilities

Affected packages
libarchive < 3.1.2_5,1
10.3 <= FreeBSD < 10.3_4
10.2 <= FreeBSD < 10.2_18
10.1 <= FreeBSD < 10.1_35
9.3 <= FreeBSD < 9.3_43

Details

VuXML ID 7c63775e-be31-11e5-b5fe-002590263bf5
Discovery 2012-12-06
Entry 2016-01-18
Modified 2016-08-09

MITRE reports:

Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.

Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.

Libarchive issue tracker reports:

Using a crafted tar file bsdtar can perform an out-of-bounds memory read which will lead to a SEGFAULT. The issue exists when the executable skips data in the archive. The amount of data to skip is defined in byte offset [16-19] If ASLR is disabled, the issue can lead to an infinite loop.

References

CVE Name CVE-2013-0211
CVE Name CVE-2015-2304
FreeBSD PR ports/200176
FreeBSD Advisory SA-16:22.libarchive
FreeBSD Advisory SA-16:23.libarchive
URL https://github.com/libarchive/libarchive/commit/2253154
URL https://github.com/libarchive/libarchive/commit/24f5de6
URL https://github.com/libarchive/libarchive/commit/3865cf2
URL https://github.com/libarchive/libarchive/commit/5935715
URL https://github.com/libarchive/libarchive/commit/e6c9668
URL https://github.com/libarchive/libarchive/issues/502
URL https://github.com/libarchive/libarchive/pull/110