{"id":"CVE-2016-4301","details":"Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.","modified":"2026-04-01T23:42:30.759246Z","published":"2016-09-21T14:25:03.377Z","related":["MGASA-2016-0239","SUSE-SU-2016:1909-1","openSUSE-SU-2024:10127-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91328"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1348441"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/issues/715"},{"type":"EVIDENCE","url":"http://blog.talosintel.com/2016/06/the-poisoned-archives.html"},{"type":"EVIDENCE","url":"http://www.talosintel.com/reports/TALOS-2016-0153/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"last_affected":"167e97be1d35c1e0947d768adbf94712244aad6b"},{"fixed":"a550daeecf6bc689ade371349892ea17b5b97c77"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"}]}}],"versions":["v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v3.0.0a","v3.0.1b","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.1.2","v3.1.900a","v3.1.901a","v3.2.0"],"database_specific":{"vanir_signatures":[{"digest":{"length":1200,"function_hash":"143880382356209121767910816968035344580"},"target":{"function":"parse_device","file":"libarchive/archive_read_support_format_mtree.c"},"id":"CVE-2016-4301-a01ffa10","source":"https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77","signature_version":"v1","deprecated":false,"signature_type":"Function"},{"digest":{"threshold":0.9,"line_hashes":["256043876767270418904297835359534923798","91329263999826924697751733287766333439","71987806477731583715113700319021518074","12951000263240183234741530784948320872","268925389337664992361160509756681494806","82969020618302814993115308206227565712","306280799597300011176829409968343651528","267811399157000271953658977092283303999","183716102513812745322458601358956163440"]},"target":{"file":"libarchive/archive_read_support_format_mtree.c"},"id":"CVE-2016-4301-a29a59a4","source":"https://github.com/libarchive/libarchive/commit/a550daeecf6bc689ade371349892ea17b5b97c77","signature_version":"v1","deprecated":false,"signature_type":"Line"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4301.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}