Impact
The vulnerability is an out-of-bounds read that occurs when the .NET Single‑File Application parser in NanaZip constructs a string from memory beyond the header buffer. A malformed RelativePathLength field in a crafted archive causes the parser to read arbitrary memory, which can lead to a memory disclosure or a crash. The weakness is a missing boundary check (CWE‑125).
Affected Systems
The affected vendor is M2Team, product NanaZip. The issue exists in all releases from 5.0.1252.0 up to, but not including, 6.0.1638.0 and 6.5.1638.0. Versions 6.0.1638.0 and 6.5.1638.0 contain the fix for the parser vulnerability.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. The EPSS score is less than 1%, suggesting a low probability of real‑world exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require delivery of a malicious archive that contains an invalid RelativePathLength; the attack is inferred to be local or remote depending on how the archive is supplied to the application, but no remote code execution is possible from the information provided.
OpenCVE Enrichment