A victim would need to open a malicious file to trigger this vulnerability. lxt2 file can lead to arbitrary code execution.
NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.Īn out-of-bounds write vulnerability exists in the LXT2 zlib block decompression functionality of GTKWave 3.3.115. NOTE: MiniZip is not a supported part of the zlib product. MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. The upstream repository is not affected.īuffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.īuffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file. Patches: The issue has been patched in commit 8352d10.
A local attacker could exploit the problem during compression using a crafted malicious file potentially leading to denial of service of the software. The issues resulted from improper input validation and heap-based buffer overflow. Cloudflare version of zlib library was found to be vulnerable to memory corruption issues affecting the deflation algorithm implementation (deflate.c).