{"id":"CVE-2016-5844","details":"Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.","modified":"2026-05-06T23:15:37.041744Z","published":"2016-09-21T14:25:16.550Z","related":["SUSE-SU-2016:2911-1","openSUSE-SU-2024:10127-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"3.2.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"11.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"fixed":"3.2.1"}],"source":"DESCRIPTION"}]},"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1850.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3657"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91808"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036173"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1350280"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/23/6"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/24/4"},{"type":"EVIDENCE","url":"https://blog.fuzzing-project.org/48-Out-of-bounds-read-and-signed-integer-overflow-in-libarchive.html"},{"type":"EVIDENCE","url":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22"},{"type":"EVIDENCE","url":"https://github.com/libarchive/libarchive/issues/717"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"fixed":"3ad08e01b4d253c66ae56414886089684155af22"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.2.0"],"database_specific":{"vanir_signatures":[{"digest":{"length":1894,"function_hash":"309817211665878327421998864817834101098"},"id":"CVE-2016-5844-551aa48b","source":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22","signature_type":"Function","signature_version":"v1","deprecated":false,"target":{"file":"libarchive/archive_read_support_format_iso9660.c","function":"choose_volume"}},{"digest":{"threshold":0.9,"line_hashes":["287042840477540275625850996134666006298","87990772638453445820226490349349017729","312159165154221987531715771017557086519","128458302336956338563818647561733167893","22510921523173158530949685053004073533","22022931925010635123919134066395979860","104039671055020794243656096233377259206","169900654792378509325950266459606794229"]},"id":"CVE-2016-5844-ce79393a","source":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22","signature_type":"Line","signature_version":"v1","deprecated":false,"target":{"file":"libarchive/archive_read_support_format_iso9660.c"}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5844.json","vanir_signatures_modified":"2026-05-06T23:15:37Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}