Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-1541 |
CWE-ID | CWE-122 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
libarchive (Alpine package) Operating systems & Components / Operating system package or component IBM Tivoli Storage Manager Server applications / File servers (FTP/HTTP) |
Vendor |
Alpine Linux Development Team IBM Corporation |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU33065
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2016-1541
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0. A remote attacker can use crafted entry-size values in a ZIP archive. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionslibarchive (Alpine package): 3.0.2-r0 - 3.1.2-r2
IBM Tivoli Storage Manager: before 5.1.5
libarchive (Alpine package): before 0.11
libarchive (Alpine package): before 1.5.3-1
libarchive (Alpine package): before 3.0pl1-116
libarchive (Alpine package): before 0.2.3-2
CPE2.3https://git.alpinelinux.org/aports/commit/?id=87822f4ac4adaaafbbee3ffe58ab6eebdc12907e
https://git.alpinelinux.org/aports/commit/?id=99073b453f33a5d1dd05323701be2557e6cd4905
https://git.alpinelinux.org/aports/commit/?id=d8416edf5bf659e7f404b1c624471b6240aa772f
https://git.alpinelinux.org/aports/commit/?id=fd77c7aec807195aafce696698671418dff7d932
https://git.alpinelinux.org/aports/commit/?id=821c39504ab39c05c1102b24d335c73b333d0040
https://git.alpinelinux.org/aports/commit/?id=f3f119d328f0cf56437edc38e278ecd7d8424ec3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.