{
  "threat_severity" : "Moderate",
  "public_date" : "2016-05-02T00:00:00Z",
  "bugzilla" : {
    "description" : "libarchive: zip_read_mac_metadata() heap-based buffer overflow",
    "id" : "1334211",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1334211"
  },
  "cvss" : {
    "cvss_base_score" : "6.0",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.4",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.", "A vulnerability was found in libarchive. A specially crafted zip file can provide an incorrect compressed size, which may allow an attacker to place arbitrary code on the heap and execute it in the context of the application." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-09-12T00:00:00Z",
    "advisory" : "RHSA-2016:1844",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "libarchive-0:3.1.2-10.el7_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "libarchive",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-1541\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-1541\nhttp://www.kb.cert.org/vuls/id/862384" ],
  "name" : "CVE-2016-1541",
  "csaw" : false
}