[arch-security] [ASA-201604-8] lhasa: arbitrary code execution

Levente Polyak anthraxx at archlinux.org
Thu Apr 14 19:43:49 UTC 2016


Arch Linux Security Advisory ASA-201604-8
=========================================

Severity: High
Date    : 2016-04-14
CVE-ID  : CVE-2016-2347
Package : lhasa
Type    : arbitrary code execution
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package lhasa before version 0.3.1-1 is vulnerable to arbitrary code
execution.

Resolution
==========

Upgrade to 0.3.1-1.

# pacman -Syu "lhasa>=0.3.1-1"

The problems has been fixed upstream in version 0.3.1

Workaround
==========

None.

Description
===========

An exploitable integer underflow exists during calculation size for all
headers in decode_level3_header function of Lhasa (lha) application.

Smaller value of header_len than LEVEL_3_HEADER_LEN ( 32 ) cause during
subtraction integer underflow and lead later to memory corruption via
heap based buffer overflow.

Impact
======

A remote attacker is able to create a specially crafted LHA archive that
results in a heap based buffer overflow leading to arbitrary code execution.

References
==========

http://www.talosintel.com/reports/TALOS-2016-0095/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2347

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160414/d6ab9772/attachment.asc>


More information about the arch-security mailing list