Description
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
Published: 2026-03-26
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Stack-Based Buffer Overflow potentially enabling code execution
Action: Patch Now
AI Analysis

Impact

A stack-based buffer overflow occurs during the Zen C compiler’s identifier mangling when struct, function, or trait names exceed expected lengths. The overflow can corrupt the compiler's stack, leading to a crash or, by exploiting the memory corruption, execution of arbitrary code. The weakness corresponds to the classic stack overflow class of vulnerabilities. The impact is loss of availability through compiler crashes and potential confidentiality, integrity, and availability compromise if code execution is achieved.

Affected Systems

The affected product is Zen C, a systems programming language that compiles to GNU C/C11, with the CNAs listing zenc‑lang as the vendor. Versions prior to 0.4.4 are vulnerable. Users who compile code with identifiers longer than normal limits are at risk. The change set in the 0.4.4 release hardens the identifier handling to eliminate the overflow.

Risk and Exploitability

The CVSS score of 7.8 denotes high severity. The EPSS score below 1 % and absence from the KEV catalog suggest a low likelihood of current exploitation. The likely attack vector, inferred from the description, is a locally‑sourced malicious source file submitted to the compiler; an attacker must have compiler access to supply the crafted identifiers. Because the vulnerability is in the compile phase, privilege escalation depends on the compiler’s runtime privileges. The absence of a publicly documented exploit reduces immediate risk but remediation is advised due to the severity and potential impact if exploited.

Generated by OpenCVE AI on April 2, 2026 at 23:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zen C to version 0.4.4 or later.
  • Restrict compiler use to trusted developers or build systems.
  • Reject or sanitize source files that contain unusually long identifiers.
  • Monitor compiler logs for crashes or abnormal behavior.

Generated by OpenCVE AI on April 2, 2026 at 23:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Z-libs
Z-libs zen C
CPEs cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:*
Vendors & Products Z-libs
Z-libs zen C

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Zenc-lang
Zenc-lang zenc
Vendors & Products Zenc-lang
Zenc-lang zenc

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch.
Title Zen-C has Stack-Based Buffer Overflow in Identifier Mangling
Weaknesses CWE-121
CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T03:55:39.895Z

Reserved: 2026-03-20T16:16:48.971Z

Link: CVE-2026-33491

cve-icon Vulnrichment

Updated: 2026-03-26T19:50:33.517Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T19:17:04.333

Modified: 2026-04-02T18:22:46.130

Link: CVE-2026-33491

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:55Z

Weaknesses