SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Zlib Vendors:   GNU [multiple authors]
(Slackware Issues Fix) Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service
SecurityTracker Alert ID:  1011536
SecurityTracker URL:  http://securitytracker.com/id/1011536
CVE Reference:   CVE-2004-0797   (Links to External Site)
Date:  Oct 4 2004
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2 - 1.2.1
Description:   A vulnerability was reported in zlib. A remote user can cause denial of service conditions.

Johan Thelmen reported that a specially crafted file can cause a segmentation fault in zlib.

It is reported that the inflate() and inflateBack() functions do not properly handle errors.

Impact:   A user can create a file that when processed by zlib, will cause a segmentation fault. The specific impact depends on the application using zlib.
Solution:   Slackware has released a fix.

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/zlib-1.2.2-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/zlib-1.2.2-i486-1.tgz


The MD5 signatures are:

Slackware 10.0 package:
dfa40fb5afb988488648fc4b7ef992f0 zlib-1.2.2-i486-1.tgz

Slackware -current package:
011d7257bb879a8159b65b0b06b58bd0 zlib-1.2.2-i486-1.tgz

Vendor URL:  www.gzip.org/zlib/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Slackware)
Underlying OS Comments:  10.0

Message History:   This archive entry is a follow-up to the message listed below.
Aug 30 2004 Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service



 Source Message Contents

Subject:  [slackware-security] zlib DoS (SSA:2004-278-02)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  zlib DoS (SSA:2004-278-02)

New zlib packages are available for Slackware 10.0 and -current to
fix a possible denial of service security issue.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-797

Here are the details from the Slackware 10.0 ChangeLog:
+--------------------------+
patches/packages/zlib-1.2.2-i486-1.tgz:  Upgraded to zlib-1.2.2.
  This fixes a possible DoS in earlier versions of zlib-1.2.x.
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/zlib-1.2.2-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/zlib-1.2.2-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 10.0 package:
dfa40fb5afb988488648fc4b7ef992f0  zlib-1.2.2-i486-1.tgz

Slackware -current package:
011d7257bb879a8159b65b0b06b58bd0  zlib-1.2.2-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg zlib-1.2.2-i486-1.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBYaRVakRjwEAQIjMRApFLAJwPA+k/RlMPxNZ258r4L91KTscDMQCfZu6l
w6U7p3sbXK6MMD03a3hgkxc=
=MEVw
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC