EUVD-2026-17073

| CVE-2026-5121 CRITICAL
2026-03-30 redhat
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 30, 2026 - 08:15 vuln.today
EUVD ID Assigned
Mar 30, 2026 - 08:15 euvd
EUVD-2026-17073
CVE Published
Mar 30, 2026 - 07:47 nvd
CRITICAL 9.8

Description

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.

Analysis

Integer overflow in libarchive's zisofs block pointer allocation on 32-bit systems allows remote code execution when processing specially crafted ISO9660 images. A remote attacker can provide a malicious ISO file that triggers a heap buffer overflow, potentially achieving arbitrary code execution on affected systems. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Vendor Status

Debian

libarchive
Release Status Fixed Version Urgency
bullseye vulnerable 3.4.3-2+deb11u1 -
bullseye (security) vulnerable 3.4.3-2+deb11u3 -
bookworm vulnerable 3.6.2-1+deb12u3 -
bookworm (security) vulnerable 3.6.2-1+deb12u2 -
trixie vulnerable 3.7.4-4 -
forky, sid vulnerable 3.8.5-1 -
(unstable) fixed (unfixed) -

Share

EUVD-2026-17073 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy