lukebrogan-mend / c-goof

Vulnerable C++ project
Apache License 2.0
0 stars 0 forks source link

zlibv1.2.11: 3 vulnerabilities (highest severity is: 9.3) #12

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - zlibv1.2.11

A massively spiffy yet delicately unobtrusive compression library.

Library home page: https://github.com/madler/zlib.git

Found in HEAD commit: 802457f036ab4eb3ba012bdede243dbbc52f72ec

Vulnerable Source Files (1)

/vendor/zlib-1.2.11.1/inflate.c

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (zlibv1.2.11 version) Remediation Possible** Reachability
CVE-2022-37434 Critical 9.3 Not Defined 0.3% zlibv1.2.11 Direct v1.2.13
CVE-2018-25032 High 8.7 Not Defined 0.3% detected in multiple dependencies Direct v1.2.12
WS-2020-0368 High 7.1 Not Defined zlibv1.2.11 Direct cmake-native - 3.15.5;binutils-cross-testsuite - 2.35;libstd-rs - 1.57.0;gdb - 11.1,9.2;tcl - 8.6.11;sudo - 1.8.32;binutils - 2.35,2.28;ccache - 3.3.3,4.1;libgit2 - 1.3.0;cmake - 3.19.5,3.7.0,3.7.2,3.22.0,3.17.3;cmake-native - 3.17.3,3.7.0,3.22.0,3.18.4;ghostscript - 9.55.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-37434 ### Vulnerable Library - zlibv1.2.11

A massively spiffy yet delicately unobtrusive compression library.

Library home page: https://github.com/madler/zlib.git

Found in HEAD commit: 802457f036ab4eb3ba012bdede243dbbc52f72ec

Found in base branch: main

### Vulnerable Source Files (1)

/vendor/zlib-1.2.11.1/inflate.c

### Vulnerability Details

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).

Publish Date: 2022-08-05

URL: CVE-2022-37434

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.3%

### CVSS 4 Score Details (9.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A

For more information on CVSS4 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2022-08-05

Fix Resolution: v1.2.13

CVE-2018-25032 ### Vulnerable Libraries - zlibv1.2.11, zlibv1.2.11, zlibv1.2.11

### Vulnerability Details

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

Publish Date: 2022-03-25

URL: CVE-2018-25032

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.3%

### CVSS 4 Score Details (8.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A

For more information on CVSS4 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2022-03-25

Fix Resolution: v1.2.12

WS-2020-0368 ### Vulnerable Library - zlibv1.2.11

A massively spiffy yet delicately unobtrusive compression library.

Library home page: https://github.com/madler/zlib.git

Found in HEAD commit: 802457f036ab4eb3ba012bdede243dbbc52f72ec

Found in base branch: main

### Vulnerable Source Files (1)

/vendor/zlib-1.2.11.1/inflate.c

### Vulnerability Details

Zlib in versions v0.8 to v1.2.11 is vulnerable to use-of-uninitialized-value in inflate. There are a couple of places in inflate() where UPDATE is called with state->check as its first parameter, without a guarantee that this value has been initialized (state comes from a ZALLOC in inflateInit). This causes use of uninitialized check value.

Publish Date: 2020-02-22

URL: WS-2020-0368

### Threat Assessment

Exploit Maturity: Not Defined

EPSS:

### CVSS 4 Score Details (7.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A

For more information on CVSS4 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/WS-2020-0368

Release Date: 2020-02-22

Fix Resolution: cmake-native - 3.15.5;binutils-cross-testsuite - 2.35;libstd-rs - 1.57.0;gdb - 11.1,9.2;tcl - 8.6.11;sudo - 1.8.32;binutils - 2.35,2.28;ccache - 3.3.3,4.1;libgit2 - 1.3.0;cmake - 3.19.5,3.7.0,3.7.2,3.22.0,3.17.3;cmake-native - 3.17.3,3.7.0,3.22.0,3.18.4;ghostscript - 9.55.0