CVE-2026-4424 - High Severity Vulnerability
Vulnerable Library - libarchivev3.8.5
Multi-format archive and compression library
Library home page: https://github.com/libarchive/libarchive.git
Found in base branches: stable/4.0, master
Vulnerable Source Files (1)
/contrib/libarchive/libarchive/archive_read_support_format_rar.c
Vulnerability Details
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
Publish Date: 2026-03-19
URL: CVE-2026-4424
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-19
Fix Resolution: https://github.com/libarchive/libarchive.git - v3.8.6
Step up your Open Source Security Game with Mend here
CVE-2026-4424 - High Severity Vulnerability
Multi-format archive and compression library
Library home page: https://github.com/libarchive/libarchive.git
Found in base branches: stable/4.0, master
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
Publish Date: 2026-03-19
URL: CVE-2026-4424
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Release Date: 2026-03-19
Fix Resolution: https://github.com/libarchive/libarchive.git - v3.8.6
Step up your Open Source Security Game with Mend here