CVE-2002-0059 (GCVE-0-2002-0059)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 02:35
Severity ?
CWE
  • n/a
Summary
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
References
http://www.cert.org/advisories/CA-2002-07.html third-party-advisory, x_refsource_CERT
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022 vendor-advisory, x_refsource_MANDRAKE
http://www.securityfocus.com/bid/4267 vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/8427 vdb-entry, x_refsource_XF
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030 vendor-advisory, x_refsource_HP
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469 vendor-advisory, x_refsource_CONECTIVA
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php vendor-advisory, x_refsource_MANDRAKE
http://www.debian.org/security/2002/dsa-122 vendor-advisory, x_refsource_DEBIAN
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt vendor-advisory, x_refsource_CALDERA
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3 vendor-advisory, x_refsource_MANDRAKE
http://www.kb.cert.org/vuls/id/368819 third-party-advisory, x_refsource_CERT-VN
http://www.redhat.com/support/errata/RHSA-2002-027.html vendor-advisory, x_refsource_REDHAT
http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt vendor-advisory, x_refsource_CALDERA
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036 vendor-advisory, x_refsource_HP
http://www.redhat.com/support/errata/RHSA-2002-026.html vendor-advisory, x_refsource_REDHAT
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037 vendor-advisory, x_refsource_HP
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:35:17.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "CA-2002-07",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2002-07.html"
          },
          {
            "name": "MDKSA-2002:022",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022"
          },
          {
            "name": "4267",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4267"
          },
          {
            "name": "zlib-doublefree-memory-corruption(8427)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8427"
          },
          {
            "name": "HPSBTL0204-030",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030"
          },
          {
            "name": "CLA-2002:469",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000469"
          },
          {
            "name": "MDKSA-2002:023",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php"
          },
          {
            "name": "DSA-122",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-122"
          },
          {
            "name": "CSSA-2002-015.1",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt"
          },
          {
            "name": "MDKSA-2002:024",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3"
          },
          {
            "name": "VU#368819",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/368819"
          },
          {
            "name": "RHSA-2002:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-027.html"
          },
          {
            "name": "CSSA-2002-014.1",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt"
          },
          {
            "name": "HPSBTL0204-036",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036"
          },
          {
            "name": "RHSA-2002:026",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-026.html"
          },
          {
            "name": "HPSBTL0204-037",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a \"double free\"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-06-16T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "CA-2002-07",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2002-07.html"
        },
        {
          "name": "MDKSA-2002:022",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022"
        },
        {
          "name": "4267",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4267"
        },
        {
          "name": "zlib-doublefree-memory-corruption(8427)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8427"
        },
        {
          "name": "HPSBTL0204-030",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030"
        },
        {
          "name": "CLA-2002:469",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000469"
        },
        {
          "name": "MDKSA-2002:023",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php"
        },
        {
          "name": "DSA-122",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-122"
        },
        {
          "name": "CSSA-2002-015.1",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt"
        },
        {
          "name": "MDKSA-2002:024",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3"
        },
        {
          "name": "VU#368819",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/368819"
        },
        {
          "name": "RHSA-2002:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-027.html"
        },
        {
          "name": "CSSA-2002-014.1",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt"
        },
        {
          "name": "HPSBTL0204-036",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036"
        },
        {
          "name": "RHSA-2002:026",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-026.html"
        },
        {
          "name": "HPSBTL0204-037",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0059",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a \"double free\"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "CA-2002-07",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2002-07.html"
            },
            {
              "name": "MDKSA-2002:022",
              "refsource": "MANDRAKE",
              "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022"
            },
            {
              "name": "4267",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4267"
            },
            {
              "name": "zlib-doublefree-memory-corruption(8427)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8427"
            },
            {
              "name": "HPSBTL0204-030",
              "refsource": "HP",
              "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030"
            },
            {
              "name": "CLA-2002:469",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000469"
            },
            {
              "name": "MDKSA-2002:023",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php"
            },
            {
              "name": "DSA-122",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-122"
            },
            {
              "name": "CSSA-2002-015.1",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt"
            },
            {
              "name": "MDKSA-2002:024",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3"
            },
            {
              "name": "VU#368819",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/368819"
            },
            {
              "name": "RHSA-2002:027",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-027.html"
            },
            {
              "name": "CSSA-2002-014.1",
              "refsource": "CALDERA",
              "url": "http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt"
            },
            {
              "name": "HPSBTL0204-036",
              "refsource": "HP",
              "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036"
            },
            {
              "name": "RHSA-2002:026",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-026.html"
            },
            {
              "name": "HPSBTL0204-037",
              "refsource": "HP",
              "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0059",
    "datePublished": "2002-06-25T04:00:00.000Z",
    "dateReserved": "2002-02-07T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:35:17.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…