SB2015031501 - Path traversal in libarchive
Published: March 15, 2015 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2015-2304)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
Remediation
Install update from vendor's website.
References
- http://advisories.mageia.org/MGASA-2015-0106.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html
- http://www.debian.org/security/2015/dsa-3180
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:157
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/16/7
- http://www.securitytracker.com/id/1035996
- http://www.ubuntu.com/usn/USN-2549-1
- https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526
- https://github.com/libarchive/libarchive/pull/110
- https://groups.google.com/forum/#!msg/libarchive-discuss/dN9y1VvE1Qk/Z9uerigjQn0J
- https://security.gentoo.org/glsa/201701-03
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:22.libarchive.asc