Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-8847 : Vulnerability Insights and Analysis

Learn about CVE-2017-8847, a vulnerability in lrzip version 0.631 that allows remote attackers to trigger a denial of service through a crafted archive, resulting in a NULL pointer dereference and application crash.

CVE-2017-8847 was published on May 8, 2017, and affects lrzip version 0.631. The vulnerability allows remote attackers to cause a denial of service by exploiting a specific function in the library.

Understanding CVE-2017-8847

This CVE entry describes a vulnerability in lrzip version 0.631 that can lead to a denial of service when a crafted archive triggers a NULL pointer dereference.

What is CVE-2017-8847?

The vulnerability in CVE-2017-8847 arises from the bufRead::get() function in libzpaq/libzpaq.h within liblrzip.so. Remote attackers can exploit this function by using a specially crafted archive to cause a NULL pointer dereference, resulting in an application crash.

The Impact of CVE-2017-8847

The exploitation of this vulnerability can lead to a denial of service, causing the application to crash due to a NULL pointer dereference. This can be triggered remotely by attackers.

Technical Details of CVE-2017-8847

CVE-2017-8847 involves the following technical aspects:

Vulnerability Description

The vulnerability in lrzip version 0.631 allows remote attackers to trigger a denial of service through a crafted archive, resulting in a NULL pointer dereference and application crash.

Affected Systems and Versions

        Product: N/A
        Vendor: N/A
        Version: lrzip 0.631

Exploitation Mechanism

The vulnerability is exploited by remote attackers using a specially crafted archive to trigger the bufRead::get() function in libzpaq/libzpaq.h, leading to a NULL pointer dereference and application crash.

Mitigation and Prevention

To address CVE-2017-8847, consider the following mitigation strategies:

Immediate Steps to Take

        Update lrzip to a non-vulnerable version.
        Implement network-level controls to prevent exploitation of the vulnerability.

Long-Term Security Practices

        Regularly update software and libraries to patch known vulnerabilities.
        Conduct security assessments and audits to identify and remediate potential weaknesses.

Patching and Updates

        Apply patches provided by the lrzip project to fix the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now