Integer Underflow The advisory has been revoked - it doesn't affect any version of package 7zip  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
32.05% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-7ZIP-8400297
  • published21 Nov 2024
  • disclosed22 Nov 2024

Introduced: 21 Nov 2024

CVE-2024-11477  (opens in a new tab)
CWE-191  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:12.

NVD Description

Note: Versions mentioned in the description apply only to the upstream 7zip package and not the 7zip package as distributed by Debian.

7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346.