PatchSiren cyber security CVE debrief
CVE-2016-1925 Lha For Unix Project CVE debrief
CVE-2016-1925 is a critical memory corruption flaw in lha’s archive header parsing. A large header size value in a level0 or level1 header can trigger an integer underflow in header.c, which in turn can lead to a buffer overflow while processing a crafted LHA archive.
- Vendor
- Lha For Unix Project
- Product
- CVE-2016-1925
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Operators and maintainers of systems that unpack or inspect LHA archives, including desktop tools, server-side file ingestion pipelines, antivirus or content-scanning services, and Linux distributions shipping lha.
Technical summary
NVD describes the issue as an integer underflow in header.c in lha. A large header size value for the level0 or level1 header can trigger the underflow and then a buffer overflow. NVD maps the weakness to CWE-191 and rates the issue CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a remotely reachable flaw with no privileges or user interaction required.
Defensive priority
High. Any environment that accepts untrusted LHA archives should prioritize patching or compensating controls because the published CVSS score is critical and the parsing flaw affects archive-handling code.
Recommended defensive actions
- Update lha to a fixed release if one is available from your distribution or upstream package source.
- If you cannot patch immediately, restrict or disable processing of untrusted LHA archives in exposed services and ingestion workflows.
- Review any applications, scanners, or automation that automatically open LHA files, including server-side upload handlers.
- Prefer sandboxing and least-privilege isolation for archive extraction jobs.
- Track distro or vendor advisories, including Gentoo GLSA-202007-42, for packaged remediation guidance.
Evidence notes
The CVE description and NVD record state that a large header size value for the level0 or level1 header in an lha archive can trigger an integer underflow in header.c and then a buffer overflow. NVD lists CWE-191 and a CVSS v3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The official references include two oss-security mailing list posts from 2016-01-18 and a Gentoo security advisory (GLSA-202007-42).
Official resources
-
CVE-2016-1925 CVE record
CVE.org
-
CVE-2016-1925 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
- Source reference
Publicly discussed in oss-security mailing list posts dated 2016-01-18; the CVE record was published by NVD on 2017-01-23 and last modified on 2026-05-13.