CVE-2016-5418

The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_hpc_node
6.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_workstation
6.0
redhatopenshift
3.1
redhatopenshift
3.2
libarchivelibarchive
𝑥
≤ 3.2.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_hpc_node
7.0
redhatenterprise_linux_hpc_node_eus
7.2
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libarchive
bullseye
3.4.3-2+deb11u1
fixed
bookworm
3.6.2-1+deb12u1
fixed
bookworm (security)
3.6.2-1+deb12u1
fixed
trixie
3.7.4-1
fixed
sid
3.7.4-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libarchive
yakkety
Fixed 3.2.1-2ubuntu0.1
released
xenial
Fixed 3.1.2-11ubuntu0.16.04.3
released
trusty
Fixed 3.1.2-7ubuntu2.4
released
precise
Fixed 3.0.3-6ubuntu1.4
released
Common Weakness Enumeration