Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22184: CWE-787 Out-of-bounds Write in zlib software zlib

0
Medium
VulnerabilityCVE-2026-22184cvecve-2026-22184cwe-787
Published: Wed Jan 07 2026 (01/07/2026, 20:25:19 UTC)
Source: CVE Database V5
Vendor/Project: zlib software
Product: zlib

Description

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:15:03 UTC

Technical Analysis

CVE-2026-22184 identifies a buffer overflow vulnerability classified as CWE-787 in the untgz utility included in zlib software versions up to and including 1.3.1.2. The vulnerability is triggered when a user supplies an excessively long archive name as a command-line argument to the untgz utility, which is a standalone demonstration tool located under contrib/untgz. This input leads to an out-of-bounds write in a fixed-size global buffer, causing a global buffer overflow. Importantly, this flaw does not affect the core zlib compression library, which is widely used for data compression and decompression. The vulnerability requires local access since the attacker must execute the untgz utility with crafted input, and user interaction is necessary to trigger the flaw. The CVSS v4.0 base score is 4.6, reflecting a medium severity level, with attack vector local, low complexity, no privileges required, but user interaction needed. The impact is limited to the untgz utility, which is primarily a demonstration tool rather than a production component. No patches or known exploits are currently reported, but the flaw could allow memory corruption, potentially leading to application crashes or arbitrary code execution within the untgz process context if exploited. The vulnerability highlights the risks of unsafe buffer handling in command-line utilities even in demonstration tools.

Potential Impact

The primary impact of CVE-2026-22184 is on systems where the untgz utility from zlib is used. Since untgz is a standalone demonstration utility and not part of the core zlib library, the scope of affected systems is limited. However, exploitation could lead to memory corruption, causing application crashes or potentially arbitrary code execution within the untgz process. This could be leveraged by a local attacker to disrupt operations or escalate privileges if combined with other vulnerabilities. For organizations, the risk is mainly in development or testing environments where untgz might be used, rather than production systems relying on the core zlib library. The vulnerability does not affect the widely deployed compression and decompression functions of zlib, so the broader ecosystem remains unaffected. Nonetheless, the presence of such a flaw in a utility distributed with zlib could be exploited in targeted attacks or during penetration testing activities. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-22184, organizations should first assess whether the untgz utility is present and used in their environments. Since the vulnerability is limited to untgz, avoiding or restricting the use of this utility is an effective mitigation. If untgz is required, users should avoid passing excessively long archive names or untrusted input via the command line. Monitoring and restricting local user access to systems where untgz is installed can reduce exploitation risk. Developers and administrators should track updates from the zlib project and apply patches or updated versions once available. Additionally, employing runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) can help mitigate exploitation attempts. Security teams should also conduct code audits on any custom utilities derived from untgz to ensure safe buffer handling. Finally, educating users about the risks of executing untrusted command-line inputs can reduce accidental exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695ec6692efadb62cf814027

Added to database: 1/7/2026, 8:47:37 PM

Last enriched: 3/5/2026, 9:15:03 AM

Last updated: 3/24/2026, 10:29:27 PM

Views: 529

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses