{"id":"CVE-2016-4302","details":"Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.","modified":"2026-04-01T23:42:35.886614Z","published":"2016-09-21T14:25:04.517Z","related":["MGASA-2016-0239","SUSE-SU-2016:1909-1"],"references":[{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3657"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91331"},{"type":"REPORT","url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1348444"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/issues/719"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700"},{"type":"EVIDENCE","url":"http://blog.talosintel.com/2016/06/the-poisoned-archives.html"},{"type":"EVIDENCE","url":"http://www.talosintel.com/reports/TALOS-2016-0154/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"last_affected":"167e97be1d35c1e0947d768adbf94712244aad6b"},{"fixed":"05caadc7eedbef471ac9610809ba683f0c698700"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"}]}}],"versions":["v2.6.0","v2.6.1","v2.6.2","v2.7.0","v2.7.1","v2.8.0","v2.8.1","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v3.0.0a","v3.0.1b","v3.0.2","v3.0.3","v3.0.4","v3.1.0","v3.1.1","v3.1.2","v3.1.900a","v3.1.901a","v3.2.0"],"database_specific":{"vanir_signatures":[{"digest":{"length":6430,"function_hash":"297510741690200676578543826215927548601"},"deprecated":false,"signature_version":"v1","target":{"file":"libarchive/archive_read_support_format_rar.c","function":"parse_codes"},"id":"CVE-2016-4302-3903f264","source":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700","signature_type":"Function"},{"digest":{"threshold":0.9,"line_hashes":["246565802277398610842427763265886724405","269429852712907734954635047388062957012","192885178850317703560125968378055403273"]},"deprecated":false,"signature_version":"v1","target":{"file":"libarchive/archive_read_support_format_rar.c"},"id":"CVE-2016-4302-cd2b8b72","source":"https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700","signature_type":"Line"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4302.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}