libarchive Vulnerability Allows Denial-of-Service
Summary
CERT-Bund has issued a security advisory regarding a vulnerability in the libarchive library, which allows for denial-of-service attacks. The vulnerability affects various operating systems including Linux, UNIX, and Windows, and specific versions of Red Hat Enterprise Linux. Mitigation measures are available.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0785 concerning a critical vulnerability (CVSS Base Score 7.5) in the libarchive C library and command-line tool. This vulnerability, exploitable remotely by anonymous attackers, allows for denial-of-service (DoS) attacks. Affected systems include Linux, UNIX, and Windows, with specific mention of Red Hat Enterprise Linux and versions of libarchive prior to 3.8.6.
Organizations utilizing libarchive, particularly those running affected Red Hat Enterprise Linux versions or older open-source libarchive installations, should review and apply available mitigation measures to prevent DoS attacks. The advisory indicates that mitigation is possible, and users are advised to consult further information and version history for specific remediation steps. The temporal score indicates a medium risk as of March 19, 2026.
What to do next
- Review systems for use of affected libarchive versions.
- Apply available mitigation measures and updates.
- Consult CERT-Bund advisory for specific remediation steps.
Source document (simplified)
[WID-SEC-2026-0785] libarchive: Schwachstelle ermöglicht Denial of Service CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
libarchive ist eine C Bibliothek und ein Kommandozeilen-Tool zum Lesen und Bearbeiten von tar, cpio, zip, ISO und anderen Formaten.
Produkte
18.03.2026
- Red Hat Enterprise Linux
- Open Source libarchive <3.8.6
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libarchive ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.