First published: Fri Mar 15 2002(Updated: )
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
zlib | <=1.1.3 | |
zlib | =1.1.1 | |
zlib | =1.0.1 | |
zlib | =1.0 | |
zlib | =1.0.5 | |
zlib | =1.0.3 | |
zlib | =1.1 | |
zlib | =1.0.2 | |
zlib | =1.0.6 | |
zlib | =1.0.4 | |
zlib | =1.0.7 | |
zlib | =1.1.2 | |
zlib | =1.0.8 | |
zlib | =1.1.3 | |
zlib | =1.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0059 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2002-0059, upgrade to zlib version 1.1.4 or later.
CVE-2002-0059 affects zlib versions 1.1.3 and earlier.
Yes, CVE-2002-0059 can be exploited by attackers remotely through malformed compression data.
The consequences of CVE-2002-0059 include the potential for arbitrary code execution leading to system compromise.