DSA-1455-1 libarchive -- denial of service

Related Vulnerabilities: CVE-2007-3641   CVE-2007-3644   CVE-2007-3645  

Several local/remote vulnerabilities have been discovered in libarchive1, a single library to read/write tar, cpio, pax, zip, iso9660 archives. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3641 It was discovered that libarchive1 would miscompute the length of a buffer resulting in a buffer overflow if yet another type of corruption occurred in a pax extension header. CVE-2007-3644 It was discovered that if an archive prematurely ended within a pax extension header the libarchive1 library could enter an infinite loop. CVE-2007-3645 If an archive prematurely ended within a tar header, immediately following a pax extension header, libarchive1 could dereference a NULL pointer. The old stable distribution (sarge), does not contain this package. For the stable distribution (etch), these problems have been fixed in version 1.2.53-2etch1. For the unstable distribution (sid), these problems have been fixed in version 2.2.4-1. We recommend that you upgrade your libarchive package.

Debian Security Advisory

DSA-1455-1 libarchive -- denial of service

Date Reported:
08 Jan 2008
Affected Packages:
libarchive1
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 432924.
In Mitre's CVE dictionary: CVE-2007-3641, CVE-2007-3644, CVE-2007-3645.
More information:

Several local/remote vulnerabilities have been discovered in libarchive1, a single library to read/write tar, cpio, pax, zip, iso9660 archives. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-3641

    It was discovered that libarchive1 would miscompute the length of a buffer resulting in a buffer overflow if yet another type of corruption occurred in a pax extension header.

  • CVE-2007-3644

    It was discovered that if an archive prematurely ended within a pax extension header the libarchive1 library could enter an infinite loop.

  • CVE-2007-3645

    If an archive prematurely ended within a tar header, immediately following a pax extension header, libarchive1 could dereference a NULL pointer.

The old stable distribution (sarge), does not contain this package.

For the stable distribution (etch), these problems have been fixed in version 1.2.53-2etch4.

For the unstable distribution (sid), these problems have been fixed in version 2.2.4-1.

We recommend that you upgrade your libarchive package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive_1.2.53-2etch4.diff.gz
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive_1.2.53.orig.tar.gz
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive_1.2.53-2etch4.dsc
Alpha:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_alpha.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_amd64.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_arm.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_arm.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_hppa.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_i386.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_i386.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_ia64.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_ia64.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_mips.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_mips.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_mipsel.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_mipsel.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_powerpc.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_s390.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_s390.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/liba/libarchive/bsdtar_1.2.53-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive1_1.2.53-2etch4_sparc.deb
http://security.debian.org/pool/updates/main/liba/libarchive/libarchive-dev_1.2.53-2etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.