{"id":"CVE-2016-4302","details":"Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.","modified":"2026-02-19T06:54:25.763633Z","published":"2016-09-21T14:25:04.517Z","related":["MGASA-2016-0239","SUSE-SU-2016:1909-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://blog.talosintel.com/2016/06/the-poisoned-archives.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3657"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91331"},{"type":"ADVISORY","url":"http://www.talosintel.com/reports/TALOS-2016-0154/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"REPORT","url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1348444"},{"type":"REPORT","url":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700"},{"type":"REPORT","url":"https://github.com/libarchive/libarchive/issues/719"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/issues/719"},{"type":"EVIDENCE","url":"http://blog.talosintel.com/2016/06/the-poisoned-archives.html"},{"type":"EVIDENCE","url":"http://www.talosintel.com/reports/TALOS-2016-0154/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"fixed":"05caadc7eedbef471ac9610809ba683f0c698700"}]}],"versions":["v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v3.0.0a","v3.0.1b","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.1.2","v3.1.900a","v3.1.901a","v3.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4302.json","vanir_signatures":[{"id":"CVE-2016-4302-3903f264","deprecated":false,"source":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700","target":{"function":"parse_codes","file":"libarchive/archive_read_support_format_rar.c"},"digest":{"function_hash":"297510741690200676578543826215927548601","length":6430},"signature_version":"v1","signature_type":"Function"},{"id":"CVE-2016-4302-cd2b8b72","deprecated":false,"source":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700","target":{"file":"libarchive/archive_read_support_format_rar.c"},"digest":{"line_hashes":["246565802277398610842427763265886724405","269429852712907734954635047388062957012","192885178850317703560125968378055403273"],"threshold":0.9},"signature_version":"v1","signature_type":"Line"}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}