Vulnerability Details : CVE-2023-52168
The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains a heap-based buffer overflow that allows an attacker to overwrite two bytes at multiple offsets beyond the allocated buffer size: buffer+512*i-2, for i=9, i=10, i=11, etc.
Vulnerability category: Overflow
Products affected by CVE-2023-52168
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-52168
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-52168
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.4
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.5
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-12 |
CWE ids for CVE-2023-52168
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-52168
-
https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/
Vulnerabilities in 7-Zip and ntfs3 – My DFIR Blog
-
http://www.openwall.com/lists/oss-security/2024/07/03/10
oss-security - CVE-2023-52168, CVE-2023-52169: buffer overflow, over-read vulnerabilities in the 7-Zip archiver
-
https://sourceforge.net/p/sevenzip/bugs/2402/
SourceForge.net: Log In to SourceForge.net
-
https://www.openwall.com/lists/oss-security/2024/07/03/10
oss-security - CVE-2023-52168, CVE-2023-52169: buffer overflow, over-read vulnerabilities in the 7-Zip archiver
Jump to