Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1541

Опубликовано: 02 мая 2016
Источник: redhat
CVSS3: 8.4
CVSS2: 6
EPSS Средний

Описание

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

A vulnerability was found in libarchive. A specially crafted zip file can provide an incorrect compressed size, which may allow an attacker to place arbitrary code on the heap and execute it in the context of the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libarchiveNot affected
Red Hat Enterprise Linux 7libarchiveFixedRHSA-2016:184412.09.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1334211libarchive: zip_read_mac_metadata() heap-based buffer overflow

EPSS

Процентиль: 93%
0.11626
Средний

8.4 High

CVSS3

6 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

CVSS3: 8.8
nvd
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.

CVSS3: 8.8
debian
больше 9 лет назад

Heap-based buffer overflow in the zip_read_mac_metadata function in ar ...

suse-cvrf
около 9 лет назад

Security update for libarchive

suse-cvrf
около 9 лет назад

Security update for libarchive

EPSS

Процентиль: 93%
0.11626
Средний

8.4 High

CVSS3

6 Medium

CVSS2