SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   HPE
(HP Issues Fix for HP Java) 'zlib' Shared Compression Library Contains 'Double Free()' Buffer Overflow That Lets Remote Users Cause Programs Using zlib to Crash or Execute Arbitrary Code
SecurityTracker Alert ID:  1005679
SecurityTracker URL:  http://securitytracker.com/id/1005679
CVE Reference:   CVE-2002-0059   (Links to External Site)
Date:  Nov 22 2002
Impact:   Denial of service via network, Execution of arbitrary code via local system, Execution of arbitrary code via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): HP-UX versions of Java (1.1.X, 1.2.X, 1.3.X, 1.4.X)
Description:   A vulnerability was reported in the zlib shared library, a widely used library that provides in-memory compress and decompression functions. A remote user could cause programs using this library to crash or to execute arbitrary code on the system.

It is reported that certain types of input will cause zlib to free the same area of memory twice (i.e., perform a "double free"), resulting in a buffer overflow condition when expanding compressed input. A remote user can cause programs that process untrusted user-supplied compressed input to crash or potentially execute arbitrary code on the system.

It is reported that web browsers or email programs that display image attachments or other programs that uncompress data may be particularly affected.

It is reported that Matthias Clasen <maclas@gmx.de> and Owen Taylor <otaylor@redhat.com> discovered this bug.

Impact:   A remote user can cause affected programs that use zlib to process untrusted user-supplied compressed input to crash or potentially execute arbitrary code on the system.
Solution:   The vendor has released a fix for HP's version of Java for the HP-UX operating system (which is affected by the zlib bug), available at:

http://www.hp.com/go/java

Manually update to version of Java with the security fix:

1.1.X - 1.1.8.07 (PA Only)
1.2.X - 1.2.2.13 (PA Only)
1.3.X - 1.3.1.04 (IA)
- 1.3.1.05 (PA)
1.4.X - 1.4.0.00

HP notes that version 1.1 is an obsolete Javasoft release line and is maintained on the HP Java archive page. Updates for that particular version are available from the archive page.

Vendor URL:  www.hp.com/go/java (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (HP/UX)

Message History:   This archive entry is a follow-up to the message listed below.
Mar 11 2002 'zlib' Shared Compression Library Contains 'Double Free()' Buffer Overflow That Lets Remote Users Cause Programs Using zlib to Crash or Execute Arbitrary Code



 Source Message Contents

Subject:  HP-UX security bulletins digest



                        HP Support Information Digests

===============================================================================
o  Security Bulletin Digest Split
   ------------------------------

   The security bulletins digest has been split into multiple digests
   based on the operating system (HP-UX, MPE/iX, and HP Secure OS 
   Software for Linux).  You will continue to receive all security
   bulletin digests unless you choose to update your subscriptions.  
   
   To update your subscriptions, use your browser to access the
   IT Resource Center on the World Wide Web at:

     http://support.itrc.hp.com/

   Under the Maintenance and Support Menu, click on the "more..." link.
   Then use the 'login' link at the left side of the screen to login
   using your IT Resource Center User ID and Password.

   Under the notifications section (near the bottom of the page), select
   Support Information Digests.

   To subscribe or unsubscribe to a specific security bulletin digest, 
   select or unselect the checkbox beside it. Then click the 
   "Update Subscriptions" button at the bottom of the page.

o  IT Resource Center World Wide Web Service
   ---------------------------------------------------

   If you subscribed through the IT Resource Center and would
   like to be REMOVED from this mailing list, access the
   IT Resource Center on the World Wide Web at:

     http://support.itrc.hp.com/

   Login using your IT Resource Center User ID and Password.
   Then select Support Information Digests (located under
   Maintenance and Support).  You may then unsubscribe from the
   appropriate digest.
===============================================================================


Digest Name:  daily HP-UX security bulletins digest
    Created:  Thu Nov 21  6:00:02 EST 2002

Table of Contents:

Document ID      Title
---------------  -----------
HPSBUX0211-0226  SSRT2146 Java Zlib compression libraries bug

The documents are listed below.
-------------------------------------------------------------------------------


Document ID:  HPSBUX0211-0226
Date Loaded:  20021120
      Title:  SSRT2146 Java Zlib compression libraries bug

-----------------------------------------------------------------
 Source: HEWLETT-PACKARD COMPANY
 SECURITY BULLETIN: HPSBUX0211-0226
 Originally issued: 21 Nov 2002
 SSRT2146 Java Zlib compression libraries bug
 -----------------------------------------------------------------

NOTICE: There are no restrictions for distribution of this Bulletin
provided that it remains complete and intact.

The information in the following Security Bulletin should be
acted upon as soon as possible.  Hewlett-Packard Company will
not be liable for any consequences to any customer resulting
from customer's failure to fully implement instructions in this
Security Bulletin as soon as possible.

 ------------------------------------------------------------------
PROBLEM: Javasoft has issued Security Bulletin 108.
         Zlib compression libraries that are built into Java
         have a bug in the decompression algorithms that may
         manifest itself as a security vulnerability.
         (See http://www.cert.org/advisories/CA-2002-07/html).
         CVE CAN-2002-0059.

IMPACT:  Potential Denial of Service, information leakage, or
         execution of arbitrary code.

PLATFORM: HP-UX versions of Java  (1.1.X, 1.2.X, 1.3.X, 1.4.X)
          running on any HP-UX platform.

SOLUTION: Manually update to version of Java with the security fix.
          1.1.X. -  1.1.8.07 (PA Only)
          1.2.X  -  1.2.2.13 (PA Only)
          1.3.X  -  1.3.1.04 (IA)
                 -  1.3.1.05 (PA)
          1.4.X  -  1.4.0.00

       Note: 1.1 is an obsolete Javasoft release line, and is
             maintained on the HP Java archive page.
             Updates for this security fix are available from
             this archive page.

MANUAL ACTIONS: Yes - Update
          1.1.X. -  1.1.8.07 (PA Only)
          1.2.X  -  1.2.2.13 (PA Only)
          1.3.X  -  1.3.1.04 (IA)
                 -  1.3.1.05 (PA)
          1.4.X  -  1.4.0.00

AVAILABILITY: Updated releases are available now from
              <www.hp.com/go/java>.
 ------------------------------------------------------------------
 A. Background
    CERT has announced that an error which interferes with the
    proper allocation and deallocation of memory used by Zlib
    compression libraries that are built into Java.
    Use of the flawed algorithms may result in a security
    vulnerability in any program that includes the affected
    libraries.

 B. Recommended solution
    Retrieve updated releases of the Java SDK from
    <www.hp.com/go/java> now. They are not available
    <itrc.hp.com>.

 C. To subscribe to automatically receive future NEW HP Security
    Bulletins from the HP IT Resource Center via electronic
    mail, do the following:

    Use your browser to get to the HP IT Resource Center page
    at:

       http://itrc.hp.com

    Use the 'Login' tab at the left side of the screen to login
    using your ID and password.  Use your existing login or the
    "Register" button at the left to create a login, in order to
    gain access to many areas of the ITRC.  Remember to save the
    User ID assigned to you, and your password.

    In the left most frame select "Maintenance and Support".

    Under the "Notifications" section (near the bottom of
    the page), select "Support Information Digests".

    To -subscribe- to future HP Security Bulletins or other
    Technical Digests, click the check box (in the left column)
    for the appropriate digest and then click the "Update
    Subscriptions" button at the bottom of the page.

    or

    To -review- bulletins already released, select the link
    (in the middle column) for the appropriate digest.

    To -gain access- to the Security Patch Matrix, select
    the link for "The Security Bulletins Archive".  (near the
    bottom of the page)  Once in the archive the third link is
    to the current Security Patch Matrix. Updated daily, this
    matrix categorizes security patches by platform/OS release,
    and by bulletin topic.  Security Patch Check completely
    automates the process of reviewing the patch matrix for
    11.XX systems.

    For information on the Security Patch Check tool, see:
    http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/
    displayProductInfo.pl?productNumber=B6834AA

    The security patch matrix is also available via anonymous
    ftp:

    ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix/

    On the "Support Information Digest Main" page:
    click on the "HP Security Bulletin Archive".

 D. To report new security vulnerabilities, send email to

    security-alert@hp.com

    Please encrypt any exploit information using the
    security-alert PGP key, available from your local key
    server, or by sending a message with a -subject- (not body)
    of 'get key' (no quotes) to security-alert@hp.com.

 ------------------------------------------------------------------

(c) Copyright 2002 Hewlett-Packard Company
Hewlett-Packard Company shall not be liable for technical or
editorial errors or omissions contained herein. The information
in this document is subject to change without notice.
Hewlett-Packard Company and the names of HP products referenced
herein are trademarks and/or service marks of Hewlett-Packard
Company.  Other product and company names mentioned herein may be
trademarks and/or service marks of their respective owners.

 ________________________________________________________________
-----End of Document ID:  HPSBUX0211-0226-------------------------------------

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC