HomeRedhatCVE-2016-5418

CVE-2016-5418

HIGH
7.5CVSS
Published: 2016-09-21
Updated: 2025-04-12
AI Analysis

Description

The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-19CWE-20

Metadata

Primary Vendor
REDHAT
Published
9/21/2016
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

redhat : enterprise_linux_desktopredhat : enterprise_linux_hpc_noderedhat : enterprise_linux_serverredhat : enterprise_linux_workstationoracle : linuxoracle : linuxredhat : openshiftredhat : openshiftlibarchive : libarchiveredhat : enterprise_linux_desktopredhat : enterprise_linux_hpc_noderedhat : enterprise_linux_hpc_node_eusredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_eusredhat : enterprise_linux_workstation

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2016-5418 | HIGH Severity | CVEDatabase.com | CVEDatabase.com