CVE-2023-45853
Published: 14 October 2023
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
Notes
Author | Note |
---|---|
mdeslaur | since 3.2.0-1, rsync builds with the system zlib contrib/minizip is no longer built in zlib in xenial+ |
Priority
Status
Package | Release | Status |
---|---|---|
klibc Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Not vulnerable
(code not present)
|
|
jammy |
Not vulnerable
(code not present)
|
|
mantic |
Not vulnerable
(code not present)
|
|
noble |
Not vulnerable
(code not present)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Not vulnerable
(code not present)
|
|
xenial |
Not vulnerable
(code not present)
|
|
rsync Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not built)
|
focal |
Not vulnerable
(code not built)
|
|
jammy |
Not vulnerable
(uses system zlib)
|
|
lunar |
Not vulnerable
(uses system zlib)
|
|
mantic |
Not vulnerable
(uses system zlib)
|
|
noble |
Not vulnerable
(uses system zlib)
|
|
trusty |
Not vulnerable
(uses system zlib)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not built)
|
|
zlib Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not built)
|
focal |
Not vulnerable
(code not built)
|
|
jammy |
Not vulnerable
(code not built)
|
|
lunar |
Not vulnerable
(code not built)
|
|
mantic |
Not vulnerable
(code not built)
|
|
noble |
Not vulnerable
(code not built)
|
|
trusty |
Needed
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not built)
|
|
Patches: upstream: https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://github.com/madler/zlib/pull/843
- https://www.winimage.com/zLibDll/minizip.html
- https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
- https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
- https://www.cve.org/CVERecord?id=CVE-2023-45853
- NVD
- Launchpad
- Debian