Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45853

Опубликовано: 14 окт. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

A flaw was found in the MiniZip component of the zlib package. When opening a new file, MiniZip doesn't properly validate the filename, comments, or extra fields length against the data type used to store this information. This may allow an attacker to craft a malicious ZIP file that will lead to an overflow on the length field. This value is further used in memory allocations and indexing, which can cause an out-of-bounds write, leading to heap corruption and possible arbitrary code execution.

Отчет

Red Hat Enterprise Linux default configuration doesn't expose zlib through any network services. Additionally, the user would need to be tricked into opening the crafted file from an attacker to be successful. The impact for Confidentiality, Integrity, and Availability is limited to the scope of the process and user privilege related to the victim, therefore, the impact is considered 'Low'.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Not affected
Red Hat build of OpenJDK 11zlibWill not fix
Red Hat build of OpenJDK 17zlibAffected
Red Hat build of OpenJDK 1.8zlibWill not fix
Red Hat Enterprise Linux 6zlibOut of support scope
Red Hat Enterprise Linux 7zlibOut of support scope
Red Hat Enterprise Linux 8zlibNot affected
Red Hat Enterprise Linux 9zlibNot affected
Red Hat OpenShift GitOpsopenshift-gitops-1/argocd-rhel8Not affected
Red Hat OpenShift GitOpsopenshift-gitops-1/argo-rollouts-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2244556zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6

EPSS

Процентиль: 59%
0.00382
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 1 года назад

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

CVSS3: 9.8
nvd
больше 1 года назад

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

CVSS3: 9.8
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 9.8
debian
больше 1 года назад

MiniZip in zlib through 1.3 has an integer overflow and resultant heap ...

suse-cvrf
больше 1 года назад

Security update for zlib

EPSS

Процентиль: 59%
0.00382
Низкий

5.3 Medium

CVSS3