[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-36227Date: (C)2022-11-23   (M)2024-04-04


In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 5.9Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
FEDORA-2022-e15be0091f
GLSA-202309-14
https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html
https://bugs.gentoo.org/882521
https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215
https://github.com/libarchive/libarchive/issues/1754

CWE    1
CWE-476
OVAL    15
oval:org.secpod.oval:def:19500292
oval:org.secpod.oval:def:2107341
oval:org.secpod.oval:def:3300588
oval:org.secpod.oval:def:2600212
...

© SecPod Technologies