Vulnerability Description
An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2024/03/20/5
- https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc8
- https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eb
- https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d8467
- https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c5
- https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a754
- https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf05399018
- https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3
- https://github.com/python/cpython/issues/109858
- https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://mail.python.org/archives/list/[email protected]/thread/XELNUX
- https://www.bamsoftware.com/hacks/zipbomb/
FAQ
What is CVE-2024-0450?
CVE-2024-0450 is a vulnerability with a CVSS score of 6.2 (MEDIUM). An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which explo...
How severe is CVE-2024-0450?
CVE-2024-0450 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0450?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.