DEBIAN-CVE-2023-40481

Source
https://security-tracker.debian.org/tracker/CVE-2023-40481
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-40481.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-40481
Upstream
Published
2024-05-03T03:15:21.153Z
Modified
2025-11-20T10:16:41.984647Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SQFS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18589.

References

Affected packages

Debian:12 / 7zip

Package

Name
7zip
Purl
pkg:deb/debian/7zip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

22.*

22.01+dfsg-8
22.01+dfsg-8+deb12u1
22.01+dfsg-9
22.01+dfsg-10~exp1

23.*

23.01+dfsg-1
23.01+dfsg-2
23.01+dfsg-3
23.01+dfsg-4~exp1
23.01+dfsg-4
23.01+dfsg-5
23.01+dfsg-6
23.01+dfsg-7
23.01+dfsg-8
23.01+dfsg-9
23.01+dfsg-10
23.01+dfsg-11
23.01+dfsg-12

24.*

24.05+dfsg-1
24.05+dfsg-2
24.05+dfsg-3
24.06+dfsg-1
24.06+dfsg-2
24.06+dfsg-3
24.06+dfsg-4
24.07+dfsg-1
24.07+dfsg-2
24.08+dfsg-1~bpo12+1
24.08+dfsg-1
24.08+dfsg-2
24.09+dfsg-1
24.09+dfsg-2~bpo12+1
24.09+dfsg-2
24.09+dfsg-3
24.09+dfsg-4
24.09+dfsg-5
24.09+dfsg-6
24.09+dfsg-7~bpo12+1
24.09+dfsg-7
24.09+dfsg-8~bpo12+1
24.09+dfsg-8

25.*

25.00+dfsg-1
25.01+dfsg-1~deb13u1
25.01+dfsg-1
25.01+dfsg-2
25.01+dfsg-3
25.01+dfsg-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-40481.json"

Debian:13 / 7zip

Package

Name
7zip
Purl
pkg:deb/debian/7zip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.01+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-40481.json"

Debian:14 / 7zip

Package

Name
7zip
Purl
pkg:deb/debian/7zip?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.01+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-40481.json"