Vulnerability Details : CVE-2013-0211
Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2013-0211
- cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:x64:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-0211
0.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-0211
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-0211
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0211
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101876.html
[SECURITY] Fedora 17 Update: libarchive-3.0.4-3.fc17Third Party Advisory
-
https://github.com/libarchive/libarchive/commit/22531545514043e04633e1c015c7540b9de9dbe4
Limit write requests to at most INT_MAX. · libarchive/libarchive@2253154 · GitHubPatch
-
http://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html
openSUSE-SU-2015:0568-1: moderate: Security update for libarchiveThird Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:147
mandriva.comThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=902998
902998 – (CVE-2013-0211) CVE-2013-0211 libarchive: read buffer overflow on 64-bit systemsPatch;Issue Tracking
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-16:23.libarchive.asc
Third Party Advisory
-
http://www.securityfocus.com/bid/58926
libarchive 'archive_write_zip_data()' Function Local Denial of Service Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101700.html
[SECURITY] Fedora 17 Update: mingw-libarchive-3.0.4-4.fc17Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101687.html
[SECURITY] Fedora 18 Update: mingw-libarchive-3.0.4-4.fc18Third Party Advisory
-
http://www.securitytracker.com/id/1035995
FreeBSD libarchive Buffer Overflow in Processing Files Lets Local Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2549-1
USN-2549-1: libarchive vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101872.html
[SECURITY] Fedora 18 Update: libarchive-3.0.4-4.fc18Third Party Advisory
Jump to