{"id":"CVE-2016-1541","details":"Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.","modified":"2026-04-16T01:38:53.410950882Z","published":"2016-05-07T10:59:04.737Z","related":["SUSE-SU-2016:1588-1","openSUSE-SU-2024:10127-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/862384"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/89355"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3574"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/862384"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2981-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"REPORT","url":"https://github.com/libarchive/libarchive/issues/656"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"fixed":"d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"}]}],"versions":["v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v3.0.0a","v3.0.1b","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.1.2","v3.1.900a","v3.1.901a"],"database_specific":{"vanir_signatures":[{"id":"CVE-2016-1541-7e332515","digest":{"threshold":0.9,"line_hashes":["48426896534176377726048874745336262249","198984821660040891711746734698485588705","158675158510671668598239649588821067954","249672597877898025562469458628542068828","222471757330240980523396797786448906687","29955010350394671833858047012515946165","303420656995630671493261446931615457184","297704672076321289725493881899609829055","104521517704438845559865922156800522217","264493677763335951630672024077811115529","101830527991593088610028410301859719665","190139030830714709428610916411975030267"]},"deprecated":false,"signature_type":"Line","source":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7","target":{"file":"libarchive/archive_read_support_format_zip.c"},"signature_version":"v1"},{"id":"CVE-2016-1541-e47b4f05","digest":{"function_hash":"24300103487728401637695827036703653251","length":3008},"signature_version":"v1","signature_type":"Function","target":{"file":"libarchive/archive_read_support_format_zip.c","function":"zip_read_mac_metadata"},"source":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7","deprecated":false}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1541.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}