CVE-2022-37434

Public Exploit

Description

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).

Categories

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 92.51% Top 5%
Vendor Advisory fedoraproject.org Vendor Advisory debian.org Vendor Advisory fedoraproject.org Vendor Advisory fedoraproject.org Vendor Advisory fedoraproject.org Vendor Advisory fedoraproject.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://github.com/ivd38/zlib_overflow third party advisory exploit
https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1 third party advisory patch
https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063 third party advisory exploit
https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764 third party advisory exploit
http://www.openwall.com/lists/oss-security/2022/08/05/2 third party advisory mailing list
https://github.com/curl/curl/issues/9271 third party advisory exploit issue tracking
http://www.openwall.com/lists/oss-security/2022/08/09/1 third party advisory patch mailing list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/ third party advisory vendor advisory mailing list
https://www.debian.org/security/2022/dsa-5218 third party advisory vendor advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/ third party advisory vendor advisory mailing list
https://security.netapp.com/advisory/ntap-20220901-0005/ third party advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/ third party advisory vendor advisory mailing list
https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html third party advisory mailing list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/ third party advisory vendor advisory mailing list
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/ third party advisory vendor advisory mailing list
https://support.apple.com/kb/HT213489 third party advisory
https://support.apple.com/kb/HT213488 third party advisory
https://support.apple.com/kb/HT213494 third party advisory
https://support.apple.com/kb/HT213493 third party advisory
https://support.apple.com/kb/HT213491 third party advisory
https://support.apple.com/kb/HT213490 third party advisory
http://seclists.org/fulldisclosure/2022/Oct/41 third party advisory mailing list
http://seclists.org/fulldisclosure/2022/Oct/38 third party advisory mailing list
http://seclists.org/fulldisclosure/2022/Oct/37 third party advisory mailing list
http://seclists.org/fulldisclosure/2022/Oct/42 third party advisory mailing list
https://security.netapp.com/advisory/ntap-20230427-0007/ third party advisory
https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d

Frequently Asked Questions

What is the severity of CVE-2022-37434?
CVE-2022-37434 has been scored as a critical severity vulnerability.
How to fix CVE-2022-37434?
To fix CVE-2022-37434, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-37434 being actively exploited in the wild?
It is possible that CVE-2022-37434 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~93% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.