CVE-2023-52168

8.4 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in 7-Zip's NTFS handler allows attackers to write two bytes beyond allocated buffer boundaries when processing malicious archives. This affects users of 7-Zip versions before 24.01 who extract untrusted NTFS-compressed archives.

💻 Affected Systems

Products:
  • 7-Zip (7zz command-line tool)
Versions: All versions before 24.01
Operating Systems: Windows, Linux, macOS (any OS where 7-Zip runs)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the 7zz command-line tool when processing NTFS-compressed archives. GUI versions may be affected depending on underlying libraries.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Arbitrary code execution leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption potentially leading to information disclosure.

🟢

If Mitigated

No impact if proper controls prevent processing untrusted archives or if patched version is used.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious archive, but common in file sharing scenarios.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious archives via phishing or shared drives.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Proof-of-concept details are publicly available in security advisories. Exploitation requires crafting a malicious NTFS archive.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.01 and later

Vendor Advisory: https://sourceforge.net/p/sevenzip/bugs/2402/

Restart Required: No

Instructions:

1. Download 7-Zip 24.01 or later from official website. 2. Uninstall old version. 3. Install new version. 4. Verify version with '7zz' command.

🔧 Temporary Workarounds

Disable NTFS handler usage

all

Avoid processing NTFS-compressed archives with vulnerable versions

# No direct command - avoid using 7zz on .ntfs or NTFS-compressed files

Use alternative extraction tools

all

Extract archives using patched versions or different software

🧯 If You Can't Patch

  • Restrict 7-Zip usage to trusted administrators only
  • Implement application whitelisting to block 7zz execution

🔍 How to Verify

Check if Vulnerable:

Run '7zz' command and check version output. If version is below 24.01, system is vulnerable.

Check Version:

7zz | grep -i version  # Linux/macOS
7zz  # Windows (version appears in output)

Verify Fix Applied:

Run '7zz' command and confirm version is 24.01 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of 7zz process
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual archive downloads followed by 7zz execution

SIEM Query:

Process creation where image='7zz.exe' AND parent process NOT IN (trusted_process_list)

🔗 References

📤 Share & Export