Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled without vsnprintf or when long inputs are truncated using vsnprintf, allows attackers to cause a denial of service or possibly execute arbitrary code.
References
Configurations
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-011.0.txt - | |
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-004.txt.asc - | |
References | () http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000619 - | |
References | () http://jvn.jp/en/jp/JVN78689801/index.html - | |
References | () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000066.html - | |
References | () http://lists.apple.com/mhonarc/security-announce/msg00038.html - | |
References | () http://marc.info/?l=bugtraq&m=104610337726297&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=104610536129508&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=104620610427210&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=104887247624907&w=2 - | |
References | () http://online.securityfocus.com/archive/1/312869 - Exploit | |
References | () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57405 - | |
References | () http://www.iss.net/security_center/static/11381.php - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/142121 - US Government Resource | |
References | () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:033 - | |
References | () http://www.osvdb.org/6599 - | |
References | () http://www.redhat.com/support/errata/RHSA-2003-079.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2003-081.html - | |
References | () http://www.securityfocus.com/bid/6913 - |
Information
Published : 2003-03-07 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2003-0107
Mitre link : CVE-2003-0107
CVE.ORG link : CVE-2003-0107
JSON object : View
Products Affected
zlib
- zlib
CWE