Impact
The vulnerability is a global buffer overflow that occurs in the untgz utility when a user supplies an excessively long archive filename on the command line. This out‑of‑bounds write corrupts memory in the running process and could potentially lead to arbitrary code execution. It is a classic CWE‑120/787 type flaw that does not affect the core zlib library but only the stand‑alone demonstration tool.
Affected Systems
The affected product is zlib as published by the zlib software project. All releases up to and including version 1.3.1.2 are vulnerable. Any deployments that use the untgz tool from these releases are at risk.
Risk and Exploitability
The CVSS score is 4.6 and the EPSS score is below 1 percent, indicating a moderate severity with a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because the attack requires local command‑line interaction with the untgz utility, the attack vector is likely a local or privilege‑elevated scenario rather than a remote exploit. The risk is therefore limited to environments where the utility is accessible to potential attackers.
OpenCVE Enrichment