CVE-2018-1000880 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Libarchive
Severity
6.5MEDIUMNVD
OSV7.5
EPSS
0.5%
top 32.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 20
Latest updateMay 13
Description
libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages5 packages
Also affects: Fedora 29, 30, Ubuntu Linux 14.04, 16.04, 18.04, 18.10
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2018-1000880 libarchive: Improper input validation in WARC parser resulting in a denial of service↗2019-01-07
Bugzilla▶
CVE-2018-1000877 CVE-2018-1000878 CVE-2018-1000879 CVE-2018-1000880 mingw-libarchive: various flaws [fedora-all]↗2019-01-07
Bugzilla▶
CVE-2018-1000877 CVE-2018-1000878 CVE-2018-1000879 CVE-2018-1000880 libarchive3: various flaws [epel-6]↗2019-01-07
Bugzilla▶
CVE-2018-1000877 CVE-2018-1000878 CVE-2018-1000879 CVE-2018-1000880 libarchive: various flaws [fedora-all]↗2019-01-07