Vulnerability Details : CVE-2023-45853
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
Vulnerability category: Overflow
Products affected by CVE-2023-45853
- cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*
- cpe:2.3:a:smihica:pyminizip:*:*:*:*:*:python:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-45853
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-45853
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-01 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
N/A
|
N/A
|
RedHat-CVE-2023-45853 |
CWE ids for CVE-2023-45853
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-45853
-
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
zlib/contrib/README.contrib at ac8f12c97d1afd9bafa9c710f827d40a407d3266 · madler/zlib · GitHubProduct
-
https://pypi.org/project/pyminizip/#history
pyminizip · PyPIRelease Notes
-
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61 - chromium/src - Git at GoogleMailing List;Patch
-
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
d709fb23806858847131027da95ef4c548813356 - chromium/src - Git at GoogleMailing List;Patch
-
http://www.openwall.com/lists/oss-security/2023/10/20/9
oss-security - CVE-2023-45853: overflows in MiniZip in zlib through 1.3Mailing List
-
https://github.com/madler/zlib/pull/843
minizip: Check length of comment, filename, and extra field, in zipOpenNewFileInZip4_64 by zmodem · Pull Request #843 · madler/zlib · GitHubIssue Tracking;Patch
-
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
[SECURITY] [DLA 3670-1] minizip security updateMailing List;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20231130-0009/
CVE-2023-45853 Zlib Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://www.winimage.com/zLibDll/minizip.html
Minizip: Zip and UnZip additionnal libraryProduct
-
http://www.openwall.com/lists/oss-security/2024/01/24/10
oss-security - Re: CVE-2023-45853: overflows in MiniZip in zlib through 1.3Mailing List
-
https://security.gentoo.org/glsa/202401-18
zlib: Buffer Overflow (GLSA 202401-18) — Gentoo securityThird Party Advisory
Jump to