Bug 1177934 (CVE-2020-21674) - VUL-1: CVE-2020-21674: bsdtar,libarchive: heap-based buffer overflow in archive_string_append_from_wcs function in archive_string.c
Summary: VUL-1: CVE-2020-21674: bsdtar,libarchive: heap-based buffer overflow in archi...
Status: RESOLVED WORKSFORME
Alias: CVE-2020-21674
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Adrian Schröter
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/269186/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-21674:4.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-10-20 17:12 UTC by Alexandros Toptsoglou
Modified: 2020-11-02 15:28 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexandros Toptsoglou 2020-10-20 17:12:09 UTC
CVE-2020-21674

Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.

Reference:
https://github.com/libarchive/libarchive/issues/1298

Upstream patch:
https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513ae48157f4

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1888786
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21674
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-21674.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21674
https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513ae48157f4
https://github.com/libarchive/libarchive/issues/1298
Comment 1 Alexandros Toptsoglou 2020-10-21 12:04:52 UTC
The patch looks applicable in SLE12 and SLE15 but running the POC did not reproduce the issue. I tried with version 3.40. SLE15-SP2 is not affected
Comment 2 Alexandros Toptsoglou 2020-11-02 15:28:07 UTC
Based on comment 1 closing as Worksforme. In doubt feel free to re-open