CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%
libz.so is vulnerable to Buffer Overflow. The vulnerability is present due to the absence of length checks in the filename
, extra_field
, and comment
parameters within the zip.c
. This oversight enables an attacker to trigger an integer overflow, leading to a heap-based buffer overflow in the zipOpenNewFileInZip4_64
function. This can occur when an attacker provides excessively long header values.
www.openwall.com/lists/oss-security/2023/10/20/9
www.openwall.com/lists/oss-security/2024/01/24/10
bugzilla.suse.com/show_bug.cgi?id=1216378
chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
github.com/madler/zlib/commit/431e66398552effd82d5c0ea982a521821782ebd
github.com/madler/zlib/pull/843
lists.debian.org/debian-lts-announce/2023/11/msg00026.html
pypi.org/project/pyminizip/#history
security.gentoo.org/glsa/202401-18
security.netapp.com/advisory/ntap-20231130-0009/
www.winimage.com/zLibDll/minizip.html