vulnerability

Amazon Linux 2023: CVE-2023-45853: Medium priority package update for zlib

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
10/14/2023
Added
02/17/2025
Modified
02/17/2025

Description

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
A flaw was found in the MiniZip component of the zlib package. When opening a new file, MiniZip doesn't properly validate the filename, comments, or extra fields length against the data type used to store this information. This may allow an attacker to craft a malicious ZIP file that will lead to an overflow on the length field. This value is further used in memory allocations and indexing, which can cause an out-of-bounds write, leading to heap corruption and possible arbitrary code execution.

Solution(s)

amazon-linux-2023-upgrade-minizip-compatamazon-linux-2023-upgrade-minizip-compat-debuginfoamazon-linux-2023-upgrade-minizip-compat-develamazon-linux-2023-upgrade-zlibamazon-linux-2023-upgrade-zlib-debuginfoamazon-linux-2023-upgrade-zlib-debugsourceamazon-linux-2023-upgrade-zlib-develamazon-linux-2023-upgrade-zlib-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.