NA

CVE-2023-45853

Published: 14/10/2023 Updated: 24/01/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

MiniZip in zlib up to and including 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip up to and including 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zlib zlib

Vendor Advisories

概述 Important: Red Hat JBoss Core Services Apache HTTP Server 2457 SP2 security update 类型/严重性 Security Advisory: Important 标题 Red Hat JBoss Core Services Apache HTTP Server 2457 Service Pack 2 is now availableRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Debian Bug report logs - #1054290 zlib: CVE-2023-45853 Package: src:zlib; Maintainer for src:zlib is Mark Brown <broonie@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 20 Oct 2023 19:48:01 UTC Severity: important Tags: patch, security, upstream Found in versions zlib/1:1213dfsg-1, z ...
MiniZip in zlib through 13 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field NOTE: MiniZip is not a supported part of the zlib product (CVE-2023-45853) ...
MiniZip in zlib through 13 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field ...

Github Repositories

Домашнее задание к занятию 5 «Практическое применение Docker» - Илларионов Дмитрий Инструкция к выполнению Для выполнения заданий обязательно ознакомьтесь с инструкцией по экономии облачных ресурсов Э

Debian package for zlib 1.3

zlib-13-deb Debian package for zlib 13 The package was generated using zlibnet/zlib-13targz and is useful for avoiding vulnerability CVE-2023-45853 Installation instructions: Download zlib-13-debdeb from here Run sudo apt install zlib-13-debdeb

Convert any URL to an LLM-friendly input with a simple prefix https://r.jina.ai/

Reader Your LLMs deserve better input Reader converts any URL to an LLM-friendly input with a simple prefix rjinaai/ Get improved output for your agent and RAG systems at no cost Live demo: jinaai/reader Or just visit these URLs rjinaai/githubcom/jina-ai/reader, rjinaai/xcom/elonmusk and see yourself Feel free to u