First published: Sat Oct 14 2023(Updated: )
Last updated 13 November 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pyminizip | <=0.2.6 | |
debian/minizip | 1.1-8+deb11u1 1.1-8+deb12u1 | |
debian/zlib | <=1:1.2.11.dfsg-2+deb11u2<=1:1.2.13.dfsg-1 | 1:1.3.dfsg+really1.3.1-1 |
zlib | <=1.3 | |
zlib | <1.3.1 | |
pyminizip | <=0.2.6 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.2.0<=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45853 is critical with a CVSS score of 9.8.
CVE-2023-45853 is a heap-based buffer overflow vulnerability in MiniZip in zlib through 1.3, which can be triggered by a long filename, comment, or extra field.
Zlib through version 1.3 is affected by CVE-2023-45853.
No, MiniZip is not a supported part of the zlib product.
To fix CVE-2023-45853, update zlib to a version that includes the patch for the vulnerability.