CVE-2017-11124
📋 TL;DR
CVE-2017-11124 is a NULL pointer dereference vulnerability in xar 1.6.1's libxar.so library that can lead to denial of service or potential remote code execution. The vulnerability occurs in the xar_unserialize function when processing malicious XAR archives. Systems using xar 1.6.1 or earlier versions are affected.
💻 Affected Systems
- xar
📦 What is this software?
Xar by Xar Project
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise if the NULL pointer dereference can be leveraged for arbitrary code execution.
Likely Case
Denial of service causing application crashes when processing malicious XAR archives.
If Mitigated
Limited impact with proper input validation and sandboxing of xar processing.
🎯 Exploit Status
Proof-of-concept exploit code is publicly available. Exploitation requires the target to process a malicious XAR archive.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.2 or later
Vendor Advisory: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S2KRIILUKBJHXDNYJQQX74TFUQRG5ND/
Restart Required: Yes
Instructions:
1. Update xar package to version 1.6.2 or later. 2. For Linux distributions: Use package manager (apt-get update && apt-get upgrade xar for Debian/Ubuntu, yum update xar for RHEL/CentOS). 3. Restart any services using xar library.
🔧 Temporary Workarounds
Disable xar processing
linuxTemporarily disable or block processing of XAR archives until patching is complete.
# Remove xar binary: sudo rm -f /usr/bin/xar
# Block xar execution: sudo chmod 000 /usr/bin/xar
🧯 If You Can't Patch
- Implement strict input validation for XAR archives before processing.
- Run xar processing in isolated containers or sandboxes with limited privileges.
🔍 How to Verify
Check if Vulnerable:
Check xar version: xar --version | grep -q '1.6.1' && echo 'VULNERABLE' || echo 'NOT VULNERABLE'
Check Version:
xar --version
Verify Fix Applied:
Verify xar version is 1.6.2 or later: xar --version
📡 Detection & Monitoring
Log Indicators:
- Segmentation fault or crash logs from xar processes
- Unexpected termination of applications using libxar.so
Network Indicators:
- Inbound XAR archive transfers to vulnerable systems
- File uploads containing XAR archives to web applications
SIEM Query:
process.name:xar AND (event.action:segfault OR event.action:crash)
🔗 References
- https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_unserialize-archive-c/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S2KRIILUKBJHXDNYJQQX74TFUQRG5ND/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YV6RF6VWM7AFYFTTS7VY5TNH26QUEEFC/
- https://blogs.gentoo.org/ago/2017/06/28/xar-null-pointer-dereference-in-xar_unserialize-archive-c/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2S2KRIILUKBJHXDNYJQQX74TFUQRG5ND/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YV6RF6VWM7AFYFTTS7VY5TNH26QUEEFC/