CVE-2016-1925

Published on: 01/23/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Lha For Unix from Lha For Unix Project contain the following vulnerability:

Integer underflow in header.c in lha allows remote attackers to have unspecified impact via a large header size value for the (1) level0 or (2) level1 header in a lha archive, which triggers a buffer overflow.

  • CVE-2016-1925 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
oss-security - Buffer Overflow in lha compression utility Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160118 Buffer Overflow in lha compression utility
oss-security - Re: Buffer Overflow in lha compression utility Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160118 Re: Buffer Overflow in lha compression utility
LHa: Buffer overflow (GLSA 202007-42) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-202007-42

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLha For Unix ProjectLha For Unix-AllAllAll
ApplicationLha For Unix ProjectLha For Unix-AllAllAll
  • cpe:2.3:a:lha_for_unix_project:lha_for_unix:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:lha_for_unix_project:lha_for_unix:-:*:*:*:*:*:*:*: