Bug 1214698 (CVE-2023-31102) - VUL-0: CVE-2023-31102: 7zip: 7Z File Parsing Integer Underflow Remote Code Execution Vulnerability
Summary: VUL-0: CVE-2023-31102: 7zip: 7Z File Parsing Integer Underflow Remote Code Ex...
Status: RESOLVED UPSTREAM
Alias: CVE-2023-31102
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376208/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-31102:7.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-28 13:03 UTC by Gabriele Sonnu
Modified: 2023-08-28 13:21 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2023-08-28 13:03:10 UTC
CVE-2023-31102

This vulnerability allows remote attackers to execute arbitrary code on affected
installations of 7-Zip. User interaction is required to exploit this
vulnerability in that the target must visit a malicious page or open a malicious
file.

The specific flaw exists within the parsing of 7Z files. The issue results from
the lack of proper validation of user-supplied data, which can result in an
integer underflow before writing to memory. An attacker can leverage this
vulnerability to execute code in the context of the current process.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31102
https://www.zerodayinitiative.com/advisories/ZDI-23-1165/
Comment 1 Gabriele Sonnu 2023-08-28 13:18:21 UTC
Seems to be fixed in 7zip 23.00. All our supported codestreams are on 23.01, so not affected.