← Back to CVEs
CVE-2007-3641
N/ADescription
archive_read_support_format_tar.c in libarchive before 2.2.4 does not properly compute the length of a certain buffer when processing a malformed pax extension header, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PAX or (2) TAR archive that triggers a buffer overflow.
CVE Details
CVSS v3.1 ScoreN/A
Published7/14/2007
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
freebsd:libarchive
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432924(secteam@freebsd.org)
http://osvdb.org/38092(secteam@freebsd.org)
http://people.freebsd.org/~kientzle/libarchive/(secteam@freebsd.org)
http://secunia.com/advisories/26050(secteam@freebsd.org)
http://secunia.com/advisories/26062(secteam@freebsd.org)
http://secunia.com/advisories/26355(secteam@freebsd.org)
http://secunia.com/advisories/28377(secteam@freebsd.org)
http://security.freebsd.org/advisories/FreeBSD-SA-07:05.libarchive.asc(secteam@freebsd.org)
http://security.freebsd.org/patches/SA-07:05/libarchive.patch(secteam@freebsd.org)
http://security.gentoo.org/glsa/glsa-200708-03.xml(secteam@freebsd.org)
http://www.debian.org/security/2008/dsa-1455(secteam@freebsd.org)
http://www.novell.com/linux/security/advisories/2007_15_sr.html(secteam@freebsd.org)
http://www.securityfocus.com/bid/24885(secteam@freebsd.org)
http://www.securitytracker.com/id?1018379(secteam@freebsd.org)
http://www.vupen.com/english/advisories/2007/2521(secteam@freebsd.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35405(secteam@freebsd.org)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432924(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/38092(af854a3a-2127-422b-91ae-364da2661108)
http://people.freebsd.org/~kientzle/libarchive/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26050(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26062(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26355(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28377(af854a3a-2127-422b-91ae-364da2661108)
http://security.freebsd.org/advisories/FreeBSD-SA-07:05.libarchive.asc(af854a3a-2127-422b-91ae-364da2661108)
http://security.freebsd.org/patches/SA-07:05/libarchive.patch(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200708-03.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1455(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2007_15_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/24885(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1018379(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/2521(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35405(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.