CVE-2016-1541

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html
http://rhn.redhat.com/errata/RHSA-2016-1844.html
http://www.debian.org/security/2016/dsa-3574
http://www.kb.cert.org/vuls/id/862384 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/89355
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685
http://www.ubuntu.com/usn/USN-2981-1
https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
https://github.com/libarchive/libarchive/issues/656
https://security.gentoo.org/glsa/201701-03
http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html
http://rhn.redhat.com/errata/RHSA-2016-1844.html
http://www.debian.org/security/2016/dsa-3574
http://www.kb.cert.org/vuls/id/862384 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/89355
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685
http://www.ubuntu.com/usn/USN-2981-1
https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
https://github.com/libarchive/libarchive/issues/656
https://security.gentoo.org/glsa/201701-03
Configurations

Configuration 1 (hide)

cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html - () http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html -
References () http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html - () http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html -
References () http://rhn.redhat.com/errata/RHSA-2016-1844.html - () http://rhn.redhat.com/errata/RHSA-2016-1844.html -
References () http://www.debian.org/security/2016/dsa-3574 - () http://www.debian.org/security/2016/dsa-3574 -
References () http://www.kb.cert.org/vuls/id/862384 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/862384 - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html -
References () http://www.securityfocus.com/bid/89355 - () http://www.securityfocus.com/bid/89355 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685 -
References () http://www.ubuntu.com/usn/USN-2981-1 - () http://www.ubuntu.com/usn/USN-2981-1 -
References () https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7 - () https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7 -
References () https://github.com/libarchive/libarchive/issues/656 - () https://github.com/libarchive/libarchive/issues/656 -
References () https://security.gentoo.org/glsa/201701-03 - () https://security.gentoo.org/glsa/201701-03 -

Information

Published : 2016-05-07 10:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1541

Mitre link : CVE-2016-1541

CVE.ORG link : CVE-2016-1541


JSON object : View

Products Affected

libarchive

  • libarchive
CWE
CWE-20

Improper Input Validation