SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   JZLib Vendors:   JCraft
(JCraft's JZlib is Also Vulnerable) Re: 'zlib' Shared Compression Library Contains 'Double Free()' Buffer Overflow That Lets Remote Users Cause Programs Using zlib to Crash or Execute Arbitrary Code
SecurityTracker Alert ID:  1003934
SecurityTracker URL:  http://securitytracker.com/id/1003934
CVE Reference:   CVE-2002-0059   (Links to External Site)
Date:  Apr 1 2002
Impact:   Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 0.0.7
Description:   A vulnerability was reported in JCraft's JZlib, a Java-based implementation of the zlib shared library, a widely used library that provides in-memory compression and decompression functions. A remote user could cause programs using this library to crash or to execute arbitrary code on the system.

It is reported that certain types of input will cause zlib to free the same area of memory twice (i.e., perform a "double free"), resulting in a buffer overflow condition when expanding compressed input. A remote user can cause programs that process untrusted user-supplied compressed input to crash or potentially execute arbitrary code on the system.

It is reported that web browsers or email programs that display image attachments or other programs that uncompress data may be particularly affected.

It is reported that Matthias Clasen <maclas@gmx.de> and Owen Taylor <otaylor@redhat.com> discovered this bug.

Impact:   A remote user can cause affected programs that use zlib to process untrusted user-supplied compressed input to crash or potentially execute arbitrary code on the system.
Solution:   The vendor has released a fixed version of JZlib (0.0.7), available at:

http://www.jcraft.com/jzlib/

Vendor URL:  www.jcraft.com/jzlib/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), error, Java

Message History:   This archive entry is a follow-up to the message listed below.
Mar 11 2002 'zlib' Shared Compression Library Contains 'Double Free()' Buffer Overflow That Lets Remote Users Cause Programs Using zlib to Crash or Execute Arbitrary Code



 Source Message Contents

Subject:  JZLib (zlib) Denial Of Service Vulnerability


JCraft's JZLib is a Java-based implementation of zlib.

http://www.jcraft.com/jzlib/ChangeLog

Changes since version 0.0.6:
- updated InfBlocks.java as zlib did to fix the vulnerability related to
  the 'double free'. Of course, JZlib is free from such a vulnerability
  like the 'double free', but JZlib had crashed with
NullPointerException
  by a specially-crafted block of invalid deflated data.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC