Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46046: n/a

0
Medium
VulnerabilityCVE-2023-46046cvecve-2023-46046
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in MiniZinc before 2.8.0 allows a NULL pointer dereference via ti_expr in a crafted .mzn file. NOTE: this is disputed because there is no common libminizinc use case in which an unattended process is supposed to run forever to process a series of atttacker-controlled .mzn files.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:58:28 UTC

Technical Analysis

CVE-2023-46046 identifies a NULL pointer dereference vulnerability in MiniZinc versions prior to 2.8.0, specifically triggered via the ti_expr component when parsing a maliciously crafted .mzn file. MiniZinc is a constraint modeling language and solver used primarily in research, academia, and some industrial optimization tasks. The vulnerability corresponds to CWE-476 (NULL Pointer Dereference), which can lead to application crashes and denial of service (DoS). The CVSS 3.1 base score is 5.5 (medium), with an attack vector of local or adjacent network (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). The vulnerability is disputed because typical MiniZinc usage does not involve unattended processes running indefinitely to process attacker-controlled input files, limiting practical exploitation scenarios. No public exploit code or known active exploitation has been reported. No official patches or fixes have been linked yet, suggesting users should monitor vendor advisories. This vulnerability primarily risks denial of service by crashing MiniZinc processes, which could disrupt automated optimization workflows or services relying on MiniZinc for constraint solving.

Potential Impact

For European organizations, the primary impact is denial of service in environments where MiniZinc is used to process .mzn files automatically or in batch mode, such as academic research labs, industrial optimization, or scheduling systems. While confidentiality and integrity are not affected, availability disruptions could delay critical decision-making processes or automated workflows. Organizations relying on MiniZinc in production or continuous integration environments could face operational interruptions. Given the low privilege and local/adjacent network attack vector, exploitation would require some level of access to the MiniZinc processing environment, limiting remote attack feasibility. However, insider threats or compromised internal systems could leverage this vulnerability to cause service outages. The lack of known exploits and the disputed nature of the vulnerability's practical impact reduce immediate risk but do not eliminate the need for caution in sensitive or high-availability environments.

Mitigation Recommendations

1. Restrict access to systems running MiniZinc, especially those processing .mzn files automatically or continuously, to trusted users only. 2. Implement strict file validation and integrity checks on .mzn files before processing to prevent malicious inputs. 3. Monitor MiniZinc process stability and implement automated restarts or alerts on crashes to minimize downtime. 4. Isolate MiniZinc processing environments in sandboxed or containerized setups to limit impact of crashes. 5. Keep MiniZinc installations updated and monitor vendor channels for patches or security advisories addressing this vulnerability. 6. Limit network access to MiniZinc services to reduce local or adjacent network attack opportunities. 7. Conduct internal audits to identify any unattended or long-running MiniZinc processes that could be targeted. 8. Educate users and administrators about the potential for denial of service via crafted .mzn files to improve detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47356d939959c8021af7

Added to database: 11/4/2025, 6:34:29 PM

Last enriched: 11/4/2025, 6:58:28 PM

Last updated: 11/5/2025, 1:16:40 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats