CVE-2026-4424
Modified Modified - Updated After Analysis
Heap Out-of-Bounds Read in libarchive RAR Processing Disclosure

Publication date: 2026-03-19

Last updated on: 2026-05-05

Assigner: Red Hat, Inc.

Description
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-03-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 13 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat openshift_container_platform 4.0
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux 9.0
redhat openshift_container_platform 4.16
redhat openshift_container_platform_for_arm64 4.16
redhat openshift_container_platform_for_power 4.16
redhat enterprise_linux 10.0
libarchive libarchive *
redhat hardened_images *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-4424 is a heap buffer overflow and information leak vulnerability in libarchive's RAR3 extraction code. It occurs due to improper handling of the LZSS sliding window size after processing a PPMd-compressed block. Specifically, when transitioning between compression methods, the code fails to reallocate the LZSS window buffer to match the new dictionary size, causing a mismatch between the buffer size and the expected size."}, {'type': 'paragraph', 'content': 'This mismatch leads to an out-of-bounds read in the function copy_from_lzss_window(), where the code attempts to copy more data than the allocated buffer size, leaking sensitive heap memory. The leaked data is returned before CRC integrity checks are performed, allowing attackers to reliably read arbitrary heap contents from a specially crafted RAR archive without authentication or user interaction.'}, {'type': 'paragraph', 'content': 'The vulnerability arises from a sequence of bugs including dictionary size inflation, faulty allocation guards, out-of-bounds reads, incorrect filter validation, and late CRC checks. The issue can be triggered by a crafted 170-byte RAR3 archive, leaking approximately 257 bytes of heap memory.'}] [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to the disclosure of sensitive heap memory information on systems using libarchive to process RAR archives. An attacker can exploit it remotely by providing a specially crafted RAR archive, causing the application to leak heap contents without requiring authentication or user interaction.

The leaked heap data may contain sensitive information, potentially exposing confidential data or internal application state. Since the leak occurs before CRC integrity checks, the attacker can reliably obtain this information, which could be used for further attacks or information gathering.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a heap out-of-bounds read triggered by processing specially crafted RAR archives with libarchive. Detection can focus on monitoring for suspicious or malformed RAR archive files being processed by applications using libarchive, especially those that automatically extract RAR files.

Since the vulnerability causes libarchive to leak heap memory during extraction before CRC checks, one detection approach is to analyze logs or outputs of archive extraction tools for unexpected memory disclosures or errors related to RAR file processing.

There are no explicit commands provided in the resources for direct detection of this vulnerability on a system or network.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, the primary step is to update libarchive to a version that includes the fix for CVE-2026-4424.

The fix involves proper reallocation of the LZSS window buffer, defensive bounds checking to prevent out-of-bounds reads, and correct validation of filter block lengths, eliminating the information leak.

Until an updated libarchive version is deployed, avoid processing untrusted or suspicious RAR archives, especially those received from unverified sources.

If possible, disable automatic extraction of RAR archives in applications or services that use libarchive to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart