National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-2096 Detail

Description

zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.

Source:  MITRE      Last Modified:  07/06/2005

Quick Info

CVE Dictionary Entry:
CVE-2005-2096
Original release date:
07/06/2005
Last revised:
07/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/14/2007)

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc External Source FREEBSD FreeBSD-SA-05:16.zlib
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt External Source SCO SCOSA-2006.6
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html External Source APPLE APPLE-SA-2008-11-13
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html Vendor Advisory External Source APPLE APPLE-SA-2005-08-17
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html External Source APPLE APPLE-SA-2005-08-15
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11500 External Source OVAL oval:org.mitre.oval:def:11500
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1262 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:1262
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1542 Tool Signature; US Government Resource External Source OVAL oval:org.mitre.oval:def:1542
http://security.gentoo.org/glsa/glsa-200507-05.xml Patch; Vendor Advisory External Source GENTOO GLSA-200507-05
http://securitytracker.com/id?1014398 Vendor Advisory External Source SECTRACK 1014398
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1 Patch; Vendor Advisory External Source SUNALERT 101989
http://support.apple.com/kb/HT3298 External Source CONFIRM http://support.apple.com/kb/HT3298
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
http://www.debian.org/security/2005/dsa-740 Patch; Vendor Advisory External Source DEBIAN DSA-740
http://www.debian.org/security/2005/dsa-797 Patch; Vendor Advisory External Source DEBIAN DSA-797
http://www.debian.org/security/2006/dsa-1026 External Source DEBIAN DSA-1026
http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml Patch; Vendor Advisory External Source GENTOO GLSA-200509-18
http://www.kb.cert.org/vuls/id/680620 Third Party Advisory; US Government Resource External Source CERT-VN VU#680620
http://www.mandriva.com/security/advisories?name=MDKSA-2005:112 External Source MANDRAKE MDKSA-2005:112
http://www.mandriva.com/security/advisories?name=MDKSA-2005:196 External Source MANDRIVA MDKSA-2005:196
http://www.mandriva.com/security/advisories?name=MDKSA-2006:070 External Source MANDRIVA MDKSA-2006:070
http://www.redhat.com/support/errata/RHSA-2005-569.html Patch; Vendor Advisory External Source REDHAT RHSA-2005:569
http://www.redhat.com/support/errata/RHSA-2008-0629.html External Source REDHAT RHSA-2008:0629
http://www.securityfocus.com/archive/1/archive/1/421411/100/0/threaded External Source HP HPSBUX02090
http://www.securityfocus.com/archive/1/archive/1/464745/100/0/threaded External Source BUGTRAQ 20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates
http://www.securityfocus.com/archive/1/archive/1/482503/100/0/threaded External Source BUGTRAQ 20071018 Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096)
http://www.securityfocus.com/archive/1/archive/1/482505/100/0/threaded External Source BUGTRAQ 20071018 Official Windows binaries of "curl" contain vulnerable zlib 1.2.2 (CAN-2005-2096)
http://www.securityfocus.com/archive/1/archive/1/482571/100/0/threaded External Source BUGTRAQ 20071020 Re: Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096)
http://www.securityfocus.com/archive/1/archive/1/482601/100/0/threaded External Source BUGTRAQ 20071021 Re: Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096)
http://www.securityfocus.com/archive/1/archive/1/482949/100/0/threaded External Source BUGTRAQ 20071029 Re: Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096)
http://www.securityfocus.com/archive/1/archive/1/482950/100/0/threaded External Source BUGTRAQ 20071029 Windows binary of "Virtual Floppy Drive 2.1" contains vulnerable zlib (CAN-2005-2096)
http://www.securityfocus.com/bid/14162 Patch External Source BID 14162
http://www.ubuntulinux.org/support/documentation/usn/usn-148-1 Vendor Advisory External Source UBUNTU USN-148-1
http://www.ubuntulinux.org/usn/usn-151-3 External Source UBUNTU USN-151-3
http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html External Source CONFIRM http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html External Source CONFIRM http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
http://www.vupen.com/english/advisories/2005/0978 External Source VUPEN ADV-2005-0978
http://www.vupen.com/english/advisories/2006/0144 External Source VUPEN ADV-2006-0144
http://www.vupen.com/english/advisories/2007/1267 External Source VUPEN ADV-2007-1267
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391 Vendor Advisory External Source MISC https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680 Vendor Advisory External Source FEDORA FLSA:162680
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064 External Source XF hpux-secure-shell-dos(24064)

References to Check Content

Identifier:
oval:org.mitre.oval:def:11500
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11500
Identifier:
oval:org.mitre.oval:def:1262
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1262
Identifier:
oval:org.mitre.oval:def:1542
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1542

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes