Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <fc3a5306-5009-425d-bea7-b1b0ceb3288b@oracle.com>
Date: Fri, 20 Oct 2023 11:42:10 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-45853: overflows in MiniZip in zlib through 1.3

CVE-2023-45853 was published last week for:

    MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based
    buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or
    extra field. NOTE: MiniZip is not a supported part of the zlib product.

where "long" means "longer than can be stored in the 16-bit length value used
for the length of these fields".

minizip is part of the contrib directory in zlib, which doesn't seem to be built
by default as far as I can tell, yet NVD has assigned a CVSS of 9.8 to make CVE
scanners scream at full volume, while Red Hat went with a CVSS of 5.3 instead:

https://access.redhat.com/security/cve/CVE-2023-45853#cve-cvss-v3

A fix has been checked into the upstream git repo:
https://github.com/madler/zlib/pull/843
but a release has not yet been made including it.

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.