Threat Management, Network Security, Patch/Configuration Management, Vulnerability Management

Severe flaws detected in popular compression library


Programming errors found in libarchive, a popular open source compression library, makes software used in a number of platforms vulnerable to exploitation, according to a guest column on the Tripwire blog, The State of Security, by security researcher Graham Cluley.

The flaws have wide-ranging repercussions as the library is used by software coders all over the globe to gain access to a variety of compressed file formats – including zip, tar, 7z, cab and more. Plus, libarchive is a source for many file and package managers embedded in Linux and BSD systems, as well as security tools and file browsers, Cluley wrote.

So it's not a trivial bug, he said. Citing security researchers at Cisco Talos, he explained that the root cause of the three newly detected flaws is a failure to properly validate input – data being read from a compressed file. Bad actors could pollute archive files that take advantage of any one of these vulnerabilities to execute unauthorized malicious code on a user's computer. "All an attacker would need to do is send a poisoned archive file to their intended target," he wrote.

With these so-called common mode failures, miscreants could compromise a variety of programs in a single incursion.

Cluley urged vendors and software developers to upgrade all relevant programs as soon as possible with patches made available by libarchive's maintainers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.