{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"dateAssigned":"2018-12-19T00:00:00.000Z","datePublic":"2018-12-20T00:00:00.000Z","descriptions":[{"lang":"en","value":"libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-12-04T00:06:07.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"USN-3859-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3859-1/"},{"name":"[debian-lts-announce] 20181221 [SECURITY] [DLA 1612-1] libarchive security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00011.html"},{"tags":["x_refsource_MISC"],"url":"https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909"},{"name":"DSA-4360","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2018/dsa-4360"},{"tags":["x_refsource_MISC"],"url":"https://github.com/libarchive/libarchive/pull/1105"},{"name":"106324","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106324"},{"tags":["x_refsource_MISC"],"url":"https://github.com/libarchive/libarchive/pull/1105/commits/bfcfe6f04ed20db2504db8a254d1f40a1d84eb28"},{"name":"FEDORA-2019-0233ec0ff3","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/"},{"name":"FEDORA-2019-fbe83d0e32","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/"},{"name":"FEDORA-2019-c595a93536","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/"},{"name":"openSUSE-SU-2019:1196","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html"},{"name":"RHSA-2019:2298","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:2298"},{"name":"RHSA-2019:3698","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:3698"},{"name":"openSUSE-SU-2019:2615","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html"},{"name":"openSUSE-SU-2019:2632","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-12-19T20:52:45.247087","DATE_REQUESTED":"2018-12-13T09:07:08","ID":"CVE-2018-1000878","REQUESTER":"dja@axtens.net","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"USN-3859-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3859-1/"},{"name":"[debian-lts-announce] 20181221 [SECURITY] [DLA 1612-1] libarchive security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00011.html"},{"name":"https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909","refsource":"MISC","url":"https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909"},{"name":"DSA-4360","refsource":"DEBIAN","url":"https://www.debian.org/security/2018/dsa-4360"},{"name":"https://github.com/libarchive/libarchive/pull/1105","refsource":"MISC","url":"https://github.com/libarchive/libarchive/pull/1105"},{"name":"106324","refsource":"BID","url":"http://www.securityfocus.com/bid/106324"},{"name":"https://github.com/libarchive/libarchive/pull/1105/commits/bfcfe6f04ed20db2504db8a254d1f40a1d84eb28","refsource":"MISC","url":"https://github.com/libarchive/libarchive/pull/1105/commits/bfcfe6f04ed20db2504db8a254d1f40a1d84eb28"},{"name":"FEDORA-2019-0233ec0ff3","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/"},{"name":"FEDORA-2019-fbe83d0e32","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/"},{"name":"FEDORA-2019-c595a93536","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/"},{"name":"openSUSE-SU-2019:1196","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html"},{"name":"RHSA-2019:2298","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:2298"},{"name":"RHSA-2019:3698","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:3698"},{"name":"openSUSE-SU-2019:2615","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html"},{"name":"openSUSE-SU-2019:2632","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T12:47:56.920Z"},"title":"CVE Program Container","references":[{"name":"USN-3859-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3859-1/"},{"name":"[debian-lts-announce] 20181221 [SECURITY] [DLA 1612-1] libarchive security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00011.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909"},{"name":"DSA-4360","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2018/dsa-4360"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/libarchive/libarchive/pull/1105"},{"name":"106324","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106324"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/libarchive/libarchive/pull/1105/commits/bfcfe6f04ed20db2504db8a254d1f40a1d84eb28"},{"name":"FEDORA-2019-0233ec0ff3","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/"},{"name":"FEDORA-2019-fbe83d0e32","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/"},{"name":"FEDORA-2019-c595a93536","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/"},{"name":"openSUSE-SU-2019:1196","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html"},{"name":"RHSA-2019:2298","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:2298"},{"name":"RHSA-2019:3698","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:3698"},{"name":"openSUSE-SU-2019:2615","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html"},{"name":"openSUSE-SU-2019:2632","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2018-1000878","datePublished":"2018-12-20T17:00:00.000Z","dateReserved":"2018-12-13T00:00:00.000Z","dateUpdated":"2024-08-05T12:47:56.920Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}