Vulnerability Details CVE-2021-31566
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.9%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2021-31566
-
cpe:2.3:a:libarchive:libarchive:-
-
cpe:2.3:a:libarchive:libarchive:2.6.0
-
cpe:2.3:a:libarchive:libarchive:2.6.1
-
cpe:2.3:a:libarchive:libarchive:2.6.2
-
cpe:2.3:a:libarchive:libarchive:2.7.0
-
cpe:2.3:a:libarchive:libarchive:2.7.1
-
cpe:2.3:a:libarchive:libarchive:2.8.0
-
cpe:2.3:a:libarchive:libarchive:2.8.1
-
cpe:2.3:a:libarchive:libarchive:2.8.2
-
cpe:2.3:a:libarchive:libarchive:2.8.3
-
cpe:2.3:a:libarchive:libarchive:2.8.4
-
cpe:2.3:a:libarchive:libarchive:2.8.5
-
cpe:2.3:a:libarchive:libarchive:3.0.0a
-
cpe:2.3:a:libarchive:libarchive:3.0.1b
-
cpe:2.3:a:libarchive:libarchive:3.0.2
-
cpe:2.3:a:libarchive:libarchive:3.0.3
-
cpe:2.3:a:libarchive:libarchive:3.0.4
-
cpe:2.3:a:libarchive:libarchive:3.1.0
-
cpe:2.3:a:libarchive:libarchive:3.1.1
-
cpe:2.3:a:libarchive:libarchive:3.1.2
-
cpe:2.3:a:libarchive:libarchive:3.1.900a
-
cpe:2.3:a:libarchive:libarchive:3.1.901a
-
cpe:2.3:a:libarchive:libarchive:3.2.0
-
cpe:2.3:a:libarchive:libarchive:3.2.1
-
cpe:2.3:a:libarchive:libarchive:3.2.2
-
cpe:2.3:a:libarchive:libarchive:3.3.0
-
cpe:2.3:a:libarchive:libarchive:3.3.1
-
cpe:2.3:a:libarchive:libarchive:3.3.2
-
cpe:2.3:a:libarchive:libarchive:3.3.3
-
cpe:2.3:a:libarchive:libarchive:3.4.0
-
cpe:2.3:a:libarchive:libarchive:3.4.1
-
cpe:2.3:a:libarchive:libarchive:3.4.2
-
cpe:2.3:a:libarchive:libarchive:3.4.3
-
cpe:2.3:a:libarchive:libarchive:3.5.0
-
cpe:2.3:a:libarchive:libarchive:3.5.1
-
cpe:2.3:a:redhat:codeready_linux_builder:-
-
cpe:2.3:a:splunk:universal_forwarder:8.2.0
-
cpe:2.3:a:splunk:universal_forwarder:8.2.10
-
cpe:2.3:a:splunk:universal_forwarder:8.2.11
-
cpe:2.3:a:splunk:universal_forwarder:8.2.6
-
cpe:2.3:a:splunk:universal_forwarder:8.2.7
-
cpe:2.3:a:splunk:universal_forwarder:8.2.8
-
cpe:2.3:a:splunk:universal_forwarder:8.2.9
-
cpe:2.3:a:splunk:universal_forwarder:9.0.0
-
cpe:2.3:a:splunk:universal_forwarder:9.0.1
-
cpe:2.3:a:splunk:universal_forwarder:9.0.2
-
cpe:2.3:a:splunk:universal_forwarder:9.0.3
-
cpe:2.3:a:splunk:universal_forwarder:9.0.4
-
cpe:2.3:a:splunk:universal_forwarder:9.0.5
-
cpe:2.3:a:splunk:universal_forwarder:9.1.0
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:fedoraproject:fedora:35
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0
-
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0
-
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6