{"id":"CVE-2016-5844","details":"Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.","modified":"2026-04-11T04:02:25.271566Z","published":"2016-09-21T14:25:16.550Z","related":["SUSE-SU-2016:2911-1","openSUSE-SU-2024:10127-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3657"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036173"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1850.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91808"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1350280"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/23/6"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/06/24/4"},{"type":"EVIDENCE","url":"https://github.com/libarchive/libarchive/issues/717"},{"type":"EVIDENCE","url":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22"},{"type":"EVIDENCE","url":"https://blog.fuzzing-project.org/48-Out-of-bounds-read-and-signed-integer-overflow-in-libarchive.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"last_affected":"167e97be1d35c1e0947d768adbf94712244aad6b"},{"fixed":"3ad08e01b4d253c66ae56414886089684155af22"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"}]}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.2.0"],"database_specific":{"vanir_signatures":[{"digest":{"function_hash":"309817211665878327421998864817834101098","length":1894},"source":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22","signature_version":"v1","target":{"function":"choose_volume","file":"libarchive/archive_read_support_format_iso9660.c"},"id":"CVE-2016-5844-551aa48b","deprecated":false,"signature_type":"Function"},{"digest":{"line_hashes":["287042840477540275625850996134666006298","87990772638453445820226490349349017729","312159165154221987531715771017557086519","128458302336956338563818647561733167893","22510921523173158530949685053004073533","22022931925010635123919134066395979860","104039671055020794243656096233377259206","169900654792378509325950266459606794229"],"threshold":0.9},"source":"https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22","signature_version":"v1","target":{"file":"libarchive/archive_read_support_format_iso9660.c"},"id":"CVE-2016-5844-ce79393a","deprecated":false,"signature_type":"Line"}],"vanir_signatures_modified":"2026-04-11T04:02:25Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5844.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"11.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}