CVE-2022-36227

Severity
9.8CRITICAL
EPSS
0.4%
top 37.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 22
Latest updateOct 16

Description

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDlibarchive/libarchive3.0.03.6.2
Debianlibarchive< 3.4.3-2+deb11u2+3
Ubuntulibarchive< 3.4.0-2ubuntu1.3+5
NVDsplunk/universal_forwarder8.2.08.2.12+2

Also affects: Debian Linux 10.0, Fedora 37

Patches

🔴Vulnerability Details

4
OSV
libarchive vulnerabilities2024-10-16
GHSA
GHSA-gpgf-w78r-4pvj: In libarchive 32022-11-22
CVEList
CVE-2022-36227: In libarchive before 32022-11-22
OSV
CVE-2022-36227: In libarchive before 32022-11-22

📋Vendor Advisories

4
Ubuntu
libarchive vulnerabilities2024-10-16
Microsoft
In libarchive before 3.6.2 the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails which leads to a resultant NULL pointer dere2022-11-08
Red Hat
libarchive: NULL pointer dereference in archive_write.c2022-07-11
Debian
CVE-2022-36227: libarchive - In libarchive before 3.6.2, the software does not check for an error after calli...2022