SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Zlib Vendors:   GNU [multiple authors]
(Mandrake Issues Fix) Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service
SecurityTracker Alert ID:  1011190
SecurityTracker URL:  http://securitytracker.com/id/1011190
CVE Reference:   CVE-2004-0797   (Links to External Site)
Date:  Sep 8 2004
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2 - 1.2.1
Description:   A vulnerability was reported in zlib. A remote user can cause denial of service conditions.

Johan Thelmen reported that a specially crafted file can cause a segmentation fault in zlib.

It is reported that the inflate() and inflateBack() functions do not properly handle errors.

Impact:   A user can create a file that when processed by zlib, will cause a segmentation fault. The specific impact depends on the application using zlib.
Solution:   Mandrake has released a fix.

Mandrakelinux 10.0:
a9299193c467df186f5ec74438b7f39e 10.0/RPMS/zlib1-1.2.1-2.1.100mdk.i586.rpm
77e1313ce85f26c83f6b994606dceb5a 10.0/RPMS/zlib1-devel-1.2.1-2.1.100mdk.i586.rpm
bfc9a9419f3c7daf4a226383d6be6ea6 10.0/SRPMS/zlib-1.2.1-2.1.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
954d58fcaa1576278f8c71de40361d72 amd64/10.0/RPMS/zlib1-1.2.1-2.1.100mdk.amd64.rpm
976edb0aa85913b28ef38b7d5efd2fbd amd64/10.0/RPMS/zlib1-devel-1.2.1-2.1.100mdk.amd64.rpm
bfc9a9419f3c7daf4a226383d6be6ea6 amd64/10.0/SRPMS/zlib-1.2.1-2.1.100mdk.src.rpm

Vendor URL:  www.gzip.org/zlib/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Mandriva/Mandrake)
Underlying OS Comments:  9.2, 10.0

Message History:   This archive entry is a follow-up to the message listed below.
Aug 30 2004 Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service



 Source Message Contents

Subject:  [Security Announce] MDKSA-2004:090 - Updated zlib packages fix


This is a multi-part message in MIME format...

------------=_1094608842-12666-3351

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           zlib
 Advisory ID:            MDKSA-2004:090
 Date:                   September 7th, 2004

 Affected versions:	 10.0
 ______________________________________________________________________

 Problem Description:

 Due to a Debian bug report, a Denial of Service vulnerability was
 discovered in the zlib compression library versions 1.2.x, in the
 inflate() and inflateBack() functions.  Older versions of zlib are
 not affected.
 
 Once the updated packages have been installed, all programs linked
 against zlib must be restarted for the new packages to take effect.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0797
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 a9299193c467df186f5ec74438b7f39e  10.0/RPMS/zlib1-1.2.1-2.1.100mdk.i586.rpm
 77e1313ce85f26c83f6b994606dceb5a  10.0/RPMS/zlib1-devel-1.2.1-2.1.100mdk.i586.rpm
 bfc9a9419f3c7daf4a226383d6be6ea6  10.0/SRPMS/zlib-1.2.1-2.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 954d58fcaa1576278f8c71de40361d72  amd64/10.0/RPMS/zlib1-1.2.1-2.1.100mdk.amd64.rpm
 976edb0aa85913b28ef38b7d5efd2fbd  amd64/10.0/RPMS/zlib1-devel-1.2.1-2.1.100mdk.amd64.rpm
 bfc9a9419f3c7daf4a226383d6be6ea6  amd64/10.0/SRPMS/zlib-1.2.1-2.1.100mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBPmOdmqjQ0CJFipgRAon8AKCVpDoa5WUVZGAaZCA4HefGH3C5WQCfVWBS
xVrRn106cFcKDHf0/gG5kHs=
=Jm5h
-----END PGP SIGNATURE-----


------------=_1094608842-12666-3351
Content-Type: text/plain; name="message.footer"
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

------------=_1094608842-12666-3351--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC