SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Zlib Vendors:   GNU [multiple authors]
(Conectiva Issues Fix) Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service
SecurityTracker Alert ID:  1012715
SecurityTracker URL:  http://securitytracker.com/id/1012715
CVE Reference:   CVE-2004-0797   (Links to External Site)
Date:  Dec 29 2004
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2 - 1.2.1
Description:   A vulnerability was reported in zlib. A remote user can cause denial of service conditions.

Johan Thelmen reported that a specially crafted file can cause a segmentation fault in zlib.

It is reported that the inflate() and inflateBack() functions do not properly handle errors.

Impact:   A user can create a file that when processed by zlib, will cause a segmentation fault. The specific impact depends on the application using zlib.
Solution:   Conectiva has released a fix.

ftp://atualizacoes.conectiva.com.br/10/SRPMS/libz1-1.2.1-47972U10_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz-devel-1.2.1-47972U10_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz-devel-static-1.2.1-47972U10_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz1-1.2.1-47972U10_1cl.i386.rpm

Vendor URL:  www.gzip.org/zlib/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Conectiva)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 30 2004 Zlib Error Handling Bug in inflate() and inflateBack() Lets Remote Users Deny Service



 Source Message Contents

Subject:  [Conectiva-updates] [CLA-2004:865] Conectiva Security Announcement


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : zlib
SUMMARY   : Fix for denial of service vulnerabilities
DATE      : 2004-09-13 12:11:00
ID        : CLA-2004:865
RELEVANT
RELEASES  : 10

- -------------------------------------------------------------------------

DESCRIPTION
 "zlib"[1] is a compression library used by several programs.
 
 Due to a Debian bug report[2], a denial of service vulnerability[2]
 was discovered in the zlib compression library versions 1.2.x, in the
 inflate() and inflateBack() functions.  An attacker could exploit
 this vulnerability to launch a denial of service attack on any
 application using the zlib library.  Older versions of zlib are not
 affected.


SOLUTION
 It is recommended that all Conectiva Linux users upgrade their
 packages.
 
 IMPORTANT: all applications linked against zlib must be restarted
 after the upgrade in order to close the vulnerabilities.
 
 
 REFERENCES
 1.http://www.gzip.org/zlib/
 2.http://bugs.debian.org/252253
 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0797


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/10/SRPMS/libz1-1.2.1-47972U10_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz-devel-1.2.1-47972U10_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz-devel-static-1.2.1-47972U10_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/10/RPMS/libz1-1.2.1-47972U10_1cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 The apt tool can be used to perform RPM packages upgrades:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions regarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
Copyright (c) 2004 Conectiva Inc.
http://www.conectiva.com

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQFBRbiY42jd0JmAcZARApCPAJ48atlBmM0PFUUbjXA0eKwdocUckACgsr07
wVfHQpY+sYGwvZdgliWZON4=
=52Fz
-----END PGP SIGNATURE-----


______________________________________________________________________
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC