{"id":"CVE-2018-1000880","details":"libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.","modified":"2026-03-20T11:24:00.548675Z","published":"2018-12-20T17:29:01.300Z","related":["MGASA-2019-0030","SUSE-SU-2019:0831-1","openSUSE-SU-2019:1196-1","openSUSE-SU-2024:10925-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3859-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4360"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106324"},{"type":"ADVISORY","url":"https://github.com/libarchive/libarchive/pull/1105"},{"type":"FIX","url":"https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/pull/1105/commits/9c84b7426660c09c18cc349f6d70b5f8168b5680"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"167e97be1d35c1e0947d768adbf94712244aad6b"},{"fixed":"614110e76d9dbb9ed3e159a71cbd75fa3b23efe3"}],"database_specific":{"versions":[{"introduced":"3.2.0"},{"fixed":"3.4.0"}]}}],"versions":["v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.3.1","v3.3.2","v3.3.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000880.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}