CVE-2002-0059

The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
References
Link Resource
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 Broken Link
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 Broken Link
http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt Broken Link
http://www.cert.org/advisories/CA-2002-07.html Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-122 Broken Link
http://www.kb.cert.org/vuls/id/368819 Third Party Advisory US Government Resource
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php Broken Link Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 Broken Link
http://www.redhat.com/support/errata/RHSA-2002-026.html Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-027.html Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/4267 Broken Link Third Party Advisory VDB Entry
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 Third Party Advisory VDB Entry
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 Broken Link
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 Broken Link
http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt Broken Link
http://www.cert.org/advisories/CA-2002-07.html Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-122 Broken Link
http://www.kb.cert.org/vuls/id/368819 Third Party Advisory US Government Resource
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php Broken Link Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 Broken Link
http://www.redhat.com/support/errata/RHSA-2002-026.html Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-027.html Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/4267 Broken Link Third Party Advisory VDB Entry
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:38

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt - Broken Link () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt - Broken Link
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 - Broken Link () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 - Broken Link
References () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 - Broken Link () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 - Broken Link
References () http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt - Broken Link () http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt - Broken Link
References () http://www.cert.org/advisories/CA-2002-07.html - Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2002-07.html - Third Party Advisory, US Government Resource
References () http://www.debian.org/security/2002/dsa-122 - Broken Link () http://www.debian.org/security/2002/dsa-122 - Broken Link
References () http://www.kb.cert.org/vuls/id/368819 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/368819 - Third Party Advisory, US Government Resource
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php - Broken Link, Patch, Vendor Advisory () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php - Broken Link, Patch, Vendor Advisory
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 - Broken Link () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2002-026.html - Broken Link, Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-026.html - Broken Link, Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2002-027.html - Broken Link, Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2002-027.html - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/4267 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/4267 - Broken Link, Third Party Advisory, VDB Entry
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 - Broken Link () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 - Broken Link
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 - Broken Link () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 - Broken Link
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 - Broken Link () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 - Third Party Advisory, VDB Entry

22 Jun 2022, 16:40

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:zlib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:zlib:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.1:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:zlib:zlib:1.0.6:*:*:*:*:*:*:*

Information

Published : 2002-03-15 05:00

Updated : 2024-11-20 23:38


NVD link : CVE-2002-0059

Mitre link : CVE-2002-0059

CVE.ORG link : CVE-2002-0059


JSON object : View

Products Affected

zlib

  • zlib
CWE
CWE-415

Double Free