{"id":"CVE-2016-1541","details":"Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.","modified":"2026-04-11T03:43:34.612484Z","published":"2016-05-07T10:59:04.737Z","related":["MGASA-2016-0179","SUSE-SU-2016:1588-1","openSUSE-SU-2024:10127-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.352685"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/89355"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2981-1"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/862384"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3574"},{"type":"REPORT","url":"https://github.com/libarchive/libarchive/issues/656"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"last_affected":"74583ab6fdbf1a2837d8102c0075ff4eeeede320"},{"fixed":"d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.901a"}]}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.1.901a"],"database_specific":{"vanir_signatures":[{"id":"CVE-2016-1541-7e332515","target":{"file":"libarchive/archive_read_support_format_zip.c"},"signature_type":"Line","digest":{"line_hashes":["48426896534176377726048874745336262249","198984821660040891711746734698485588705","158675158510671668598239649588821067954","249672597877898025562469458628542068828","222471757330240980523396797786448906687","29955010350394671833858047012515946165","303420656995630671493261446931615457184","297704672076321289725493881899609829055","104521517704438845559865922156800522217","264493677763335951630672024077811115529","101830527991593088610028410301859719665","190139030830714709428610916411975030267"],"threshold":0.9},"signature_version":"v1","deprecated":false,"source":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"},{"id":"CVE-2016-1541-e47b4f05","target":{"function":"zip_read_mac_metadata","file":"libarchive/archive_read_support_format_zip.c"},"signature_type":"Function","digest":{"length":3008,"function_hash":"24300103487728401637695827036703653251"},"signature_version":"v1","deprecated":false,"source":"https://github.com/libarchive/libarchive/commit/d0331e8e5b05b475f20b1f3101fe1ad772d7e7e7"}],"vanir_signatures_modified":"2026-04-11T03:43:34Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1541.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}