Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1541

Опубликовано: 07 мая 2016
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libarchivefixed3.2.0-1experimentalpackage
libarchivefixed3.1.2-11.1package
libarchivenot-affectedwheezypackage

Примечания

  • keeping the experimental tracking version as well since maintainer said not to merge NMU changelog

  • http://www.kb.cert.org/vuls/id/862384

  • http://www.talosintel.com/reports/TALOS-2016-0155/

  • https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7 (v3.2.0)

  • Feature added in https://github.com/libarchive/libarchive/commit/1399a59680fa2dfca68764468ed0bcaa0331fde7

EPSS

Процентиль: 92%
0.09266
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

CVSS3: 8.4
redhat
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

CVSS3: 8.8
nvd
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

suse-cvrf
около 9 лет назад

Security update for libarchive

suse-cvrf
около 9 лет назад

Security update for libarchive

EPSS

Процентиль: 92%
0.09266
Низкий