CVE-2023-45853: Integer Overflow or Wraparound
(updated )
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
References
- www.openwall.com/lists/oss-security/2023/10/20/9
- chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
- chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
- github.com/advisories/GHSA-mq29-j5xf-cjwr
- github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib
- github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
- github.com/madler/zlib/pull/843
- github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
- lists.debian.org/debian-lts-announce/2023/11/msg00026.html
- nvd.nist.gov/vuln/detail/CVE-2023-45853
- pypi.org/project/pyminizip/
- security.netapp.com/advisory/ntap-20231130-0009/
- www.winimage.com/zLibDll/minizip.html
Detect and mitigate CVE-2023-45853 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →