SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Zlib Vendors:   GNU [multiple authors]
(Vendor Issues Fix) Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service
SecurityTracker Alert ID:  1012055
SecurityTracker URL:  http://securitytracker.com/id/1012055
CVE Reference:   CVE-2004-0797   (Links to External Site)
Date:  Nov 3 2004
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2 - 1.2.1
Description:   A vulnerability was reported in zlib. A remote user can cause denial of service conditions.

Johan Thelmen reported that a specially crafted file can cause a segmentation fault in zlib.

It is reported that the inflate() and inflateBack() functions do not properly handle errors.

Impact:   A user can create a file that when processed by zlib, will cause a segmentation fault. The specific impact depends on the application using zlib.
Solution:   The vendor has issued a fixed version (1.2.2), available at:

http://www.zlib.net/

Vendor URL:  www.gzip.org/zlib/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 30 2004 Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service



 Source Message Contents

Subject:  zlib 1.2.2 released


(List moderators -- in the previous version of this email I sent you, I 
forgot to include a link to the vulnerability, corrected below.)

Security guardians,

zlib 1.2.2 has been released, which remedies a vulnerability to a 
denial-of-service attack ( http://www.kb.cert.org/vuls/id/238678 ).  
You can get the latest release here:

     http://www.zlib.net/

Note that the "canonical" zlib site at http://www.zlib.org/ has yet to 
be updated by the owner, Jean-loup Gailly, and still shows zlib 1.2.1.  
You should go to the above site for the latest release.  My gpg 
signature on the zlib-1.2.2.tar.gz is attached below.

Mark Adler


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iD8DBQBBYMGieD/Njli8r7oRAvHKAJ9zK6T7xrX/1pNSYAHWlyW4JRgC8gCg8omS
1EgmRUAJmthccZ3/ot8ceB0=
=1fnD
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC