zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
CVE-2022-37434 - High Severity Vulnerability
Vulnerable Libraries - libz-sys-1.1.8.crate, libgit2-sys-0.12.26+1.3.0.crate
libz-sys-1.1.8.crate
Low-level bindings to the system libz library (also known as zlib).
Library home page: https://crates.io/api/v1/crates/libz-sys/1.1.8/download
Dependency Hierarchy: - built-0.5.1.crate (Root Library) - git2-0.13.25.crate - libgit2-sys-0.12.26+1.3.0.crate - :x: **libz-sys-1.1.8.crate** (Vulnerable Library)
libgit2-sys-0.12.26+1.3.0.crate
Native bindings to the libgit2 library
Library home page: https://crates.io/api/v1/crates/libgit2-sys/0.12.26+1.3.0/download
Dependency Hierarchy: - built-0.5.1.crate (Root Library) - git2-0.13.25.crate - :x: **libgit2-sys-0.12.26+1.3.0.crate** (Vulnerable Library)
Found in HEAD commit: 0f5b2911035c371dfb8b2b98875a5b05ad53b7a4
Found in base branch: main
Vulnerability Details
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
Publish Date: 2022-08-05
URL: CVE-2022-37434
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.