9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
46.8%
MiniZip in zlib through 1.3 has an integer overflow and resultant
heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename,
comment, or extra field. NOTE: MiniZip is not a supported part of the zlib
product. NOTE: pyminizip through 0.2.6 is also vulnerable because it
bundles an affected zlib version, and exposes the applicable MiniZip code
through its compress API.
Author | Note |
---|---|
mdeslaur | since 3.2.0-1, rsync builds with the system zlib contrib/minizip is no longer built in zlib in xenial+ |
chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
github.com/madler/zlib/pull/843
launchpad.net/bugs/cve/CVE-2023-45853
nvd.nist.gov/vuln/detail/CVE-2023-45853
security-tracker.debian.org/tracker/CVE-2023-45853
www.cve.org/CVERecord?id=CVE-2023-45853
www.winimage.com/zLibDll/minizip.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
46.8%