Vulnerability Description
Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libarchive | Libarchive | 3.4.1 |
Related Weaknesses (CWE)
References
- https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513aPatchThird Party Advisory
- https://github.com/libarchive/libarchive/issues/1298Third Party Advisory
- https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513aPatchThird Party Advisory
- https://github.com/libarchive/libarchive/issues/1298Third Party Advisory
FAQ
What is CVE-2020-21674?
CVE-2020-21674 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory result...
How severe is CVE-2020-21674?
CVE-2020-21674 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-21674?
Check the references section above for vendor advisories and patch information. Affected products include: Libarchive Libarchive.