'libarchive' Multiple Remote Vulnerabilities

To exploit these vulnerabilities, an attacker must entice a victim to open a corrupted archive file.

Proof-of-concept archive files are available from the University of Oulu at the following URI:

http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/


 

Privacy Statement
Copyright 2010, SecurityFocus