A buffer overflow in the zlib compression library may cause any application linked to zlib to improperly and immediately terminate.
There is a buffer overflow in the zlib data-compression library caused by a lack of bounds checking in the inflate() routine. If an attacker supplies the inflate()routine with a specially crafted compressed data stream, that attacker may be able to trigger the buffer overflow causing any application linked to zlib, or incorporating zlib code to crash. According to reports, the buffer overflow is caused by a specific input stream and results in a constant value being written into an arbitrary memory location. This vulnerability may be exploited locally or remotely depending on the application being attacked.
This vulnerability only affects zlib versions 1.2.1 and 1.2.2.
A remote attacker be able to exploit this vulnerability by supplying the inflate() routine with specially crafted compressed data. As a result, applications linked to the zlib library may abruptly and abnormally terminate resulting in a denial-of-service condition. According to public reports, this vulnerability can be exploited to execute arbitrary code, but we have not confirmed this.
Apply patches from your vendor
This vulnerability was reported by Mark Adler.
This document was written by Jeff Gennari.
|Date First Published:||2005-07-12|
|Date Last Updated:||2007-04-05 12:45 UTC|