Categories: Cyber Security News

Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz

A severe global buffer overflow vulnerability has been discovered in the zlib untgz utility version 1.3.1.2. Allowing attackers to corrupt memory and potentially execute malicious code through specially crafted command-line input.​

The security flaw resides in the TGZfname() function of the untgz utility, where an unbounded strcpy() call processes user-supplied archive names without any length validation.

The vulnerability occurs when the utility copies attacker-controlled input from the command line into a fixed-size static global buffer of only 1,024 bytes.​

Technical Details

The root cause stems from poor input handling: the archive name is derived directly from the argv[] parameters and copied into a global static array without bounds checking.

This overflow occurs immediately upon function entry, before any archive parsing or validation. Making the vulnerability trivially exploitable through command-line arguments alone.​

Attribute Details
CVE ID Not yet assigned
Affected Software zlib untgz utility
Affected Version v1.3.1.2
Vulnerability Type Global Buffer Overflow
CWE CWE-120 (Buffer Copy without Checking Size of Input)
Attack Vector Command-line input
Impact Denial of Service, Memory Corruption, Potential Code Execution

Security researchers demonstrated that supplying an archive name exceeding 1,024 bytes triggers an out-of-bounds write past the buffer’s end, leading to memory corruption.

The potential impacts include denial-of-service crashes, corruption of adjacent global memory objects, and undefined behavior.

More critically, depending on compiler settings, system architecture, build flags, and memory layout, attackers may be able to execute code.​

Researchers successfully triggered the vulnerability using AddressSanitizer (ASAN) by invoking untgz with a 4,096-byte filename argument.

The ASAN output confirmed a global buffer overflow caused by a write of 2,001 bytes to the vulnerable memory address.​

Because the overflow affects global memory rather than stack memory, the corruption persists beyond the function scope and can influence subsequent program behavior.

The vulnerability requires no special privileges and has low attack complexity, making it particularly dangerous for systems using the affected zlib untgz utility.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Jodi’s Journal: The rest of the story behind Forward Sioux Falls

May 10, 2026 Imagine if the biggest, most influential businesses in this country came together…

50 minutes ago

Crimson Desert Adds Surprise Claw Machine Mini-Game and Lets Pet Dogs Attack Enemies as Part of Update 1.06.00

Crimson Desert developer Pearl Abyss has released this week’s update as promised, and it adds…

55 minutes ago

Nearly 50 Years Later, WKRP in Cincinnati Becomes a Real Radio Station

It took nearly 50 years. WKRP in Cincinnati is no longer just a TV sitcom.…

1 hour ago

Record turnout, beautiful weather highlight Friday’s Chamber Golf Tournament at Big Creek

The Mountain Home Area Chamber of Commerce hosted its 2026 Four-Person Scramble Golf Tournament Friday…

1 hour ago

Lead Hill man competes on Netflix reality show “Million Dollar Secret”

Growing up and spending all of his 44-years in Lead Hill and living on the…

1 hour ago

MH Mayor Adams gives update on community center progress

Mountain Home Mayor Hillrey Adams says work is continuing at a rapid pace as the…

1 hour ago

This website uses cookies.