Heap-based buffer overflow in libarchive - CVE-2016-1541
Published: May 7, 2016 / Updated: August 3, 2020
libarchive
libarchive
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0. A remote attacker can use crafted entry-size values in a ZIP archive. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- http://www.debian.org/security/2016/dsa-3574
- http://www.kb.cert.org/vuls/id/862384
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/89355
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685
- http://www.ubuntu.com/usn/USN-2981-1
- https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7
- https://github.com/libarchive/libarchive/issues/656
- https://security.gentoo.org/glsa/201701-03