8.8
CVSSv3

CVE-2016-1541

Published: 07/05/2016 Updated: 05/01/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive prior to 3.2.0 allows remote malicious users to execute arbitrary code via crafted entry-size values in a ZIP archive.

Vulnerable Product Search on Vulmon Subscribe to Product

libarchive libarchive

Vendor Advisories

Debian Bug report logs - #823893 libarchive: CVE-2016-1541 Package: src:libarchive; Maintainer for src:libarchive is Peter Pentchev <roam@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 10 May 2016 04:39:02 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Found in ver ...
libarchive could be made to crash or run programs if it opened a specially crafted file ...
Rock Stevens, Andrew Ruef and Marcin Icewall Noga discovered a heap-based buffer overflow vulnerability in the zip_read_mac_metadata function in libarchive, a multi-format archive and compression library, which may lead to the execution of arbitrary code if a user or automated system is tricked into processing a specially crafted ZIP file For the ...
A flaw was found in the way libarchive handled hardlink archive entries of non-zero size Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive (CVE-2016-5418) Multiple out-of-bounds write flaws were found in libarchive S ...
A vulnerability was found in libarchive A specially crafted zip file can provide an incorrect compressed size, which may allow an attacker to place arbitrary code on the heap and execute it in the context of the application ...