CVE-2002-0059

Scores

EPSS

0.299low29.9%
0%20%40%60%80%100%

Percentile: 29.9%

CVSS

7.0high3.x
0246810

CVSS Score: 7.0/10

All CVSS Scores

CVSS 3.x
7.0

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a “double free”), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-415CWE-416

Recommendations

Source: nvd

Upgrade your version of zlibThe maintainers of zlib have released version 1.1.4 to address this vulnerability. Any software that is linked to or derived from an earlier version of zlib should be upgraded immediately. The latest version of zlib is available at http://www.zlib.org.These are the MD5 checksums for zlib version 1.1.4: abc405d0bdd3ee22782d7aa20e440f08 zlib-1.1.4.tar.gz9bf1d36ced334b0cf1f996f5c8171018 zlib114.zip The maintainers of zlib have published an advisory regarding this issue; for further information, please see http://www.gzip.org/zlib/advisory-2002-03-11.txt Apply a patch from your vendorThe zlib compression library is freely available and used by many vendors in a wide variety of applications. Any one of these applications may contain vulnerabilities that are introduced by this vulnerability. For the most recent information available to the CERT/CC, please see the vendor section of this document.

URL: http://www.kb.cert.org/vuls/id/368819

Vulnerable Software (1)

Type: Configuration

Vendor: zlib

Product: zlib

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.1.3",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd