CVE-2016-1541
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
07/05/2016
Last modified:
05/01/2018
Description
Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:* | 3.1.901a (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- http://www.debian.org/security/2016/dsa-3574
- http://www.kb.cert.org/vuls/id/862384
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/89355
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685
- http://www.ubuntu.com/usn/USN-2981-1
- https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
- https://github.com/libarchive/libarchive/issues/656
- https://security.gentoo.org/glsa/201701-03