CVE-2002-0059

The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*

History

02 Feb 2024, 15:16

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-415
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt - Broken Link
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 - Broken Link
References () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 - () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 - Broken Link
References () http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt - () http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt - Broken Link
References () http://www.cert.org/advisories/CA-2002-07.html - US Government Resource () http://www.cert.org/advisories/CA-2002-07.html - Third Party Advisory, US Government Resource
References () http://www.debian.org/security/2002/dsa-122 - () http://www.debian.org/security/2002/dsa-122 - Broken Link
References () http://www.kb.cert.org/vuls/id/368819 - US Government Resource () http://www.kb.cert.org/vuls/id/368819 - Third Party Advisory, US Government Resource
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php - Patch, Vendor Advisory () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php - Broken Link, Patch, Vendor Advisory
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 - () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-026.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-026.html - Broken Link, Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2002-027.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-027.html - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/4267 - () http://www.securityfocus.com/bid/4267 - Broken Link, Third Party Advisory, VDB Entry
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 - () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 - Broken Link
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 - () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 - Broken Link
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 - () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:zlib:zlib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*

22 Jun 2022, 16:40

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:zlib:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.1:*:*:*:*:*:*:*
First Time Zlib
Zlib zlib

Information

Published : 2002-03-15 05:00

Updated : 2024-02-02 15:16


NVD link : CVE-2002-0059

Mitre link : CVE-2002-0059

CVE.ORG link : CVE-2002-0059


JSON object : View

Products Affected

zlib

  • zlib
CWE
CWE-415

Double Free