Vulnerability Details : CVE-2005-2096
zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-2096
Probability of exploitation activity in the next 30 days: 5.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-2096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2005-2096
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
- http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
- http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
- http://www.vupen.com/english/advisories/2006/0144
-
http://www.securityfocus.com/archive/1/482601/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
-
https://usn.ubuntu.com/148-1/
- http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
- http://www.ubuntulinux.org/usn/usn-151-3
-
http://securitytracker.com/id?1014398
Vendor Advisory
- http://www.securityfocus.com/archive/1/464745/100/0/threaded
- http://www.debian.org/security/2006/dsa-1026
-
http://www.vupen.com/english/advisories/2005/0978
-
http://www.securityfocus.com/archive/1/482949/100/0/threaded
-
http://www.securityfocus.com/archive/1/482950/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
-
http://www.redhat.com/support/errata/RHSA-2005-569.html
Patch;Vendor Advisory
- http://support.apple.com/kb/HT3298
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
-
http://www.kb.cert.org/vuls/id/680620
Third Party Advisory;US Government Resource
-
http://www.debian.org/security/2005/dsa-740
Patch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200507-05.xml
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/482505/100/0/threaded
-
http://www.debian.org/security/2005/dsa-797
Patch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
- http://www.securityfocus.com/archive/1/421411/100/0/threaded
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
- http://www.vupen.com/english/advisories/2007/1267
-
http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
Patch;Vendor Advisory
- http://www.redhat.com/support/errata/RHSA-2008-0629.html
-
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Vendor Advisory
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
Vendor Advisory
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
- http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
-
http://www.securityfocus.com/bid/14162
Patch
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
Vendor Advisory
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/482571/100/0/threaded
-
http://www.securityfocus.com/archive/1/482503/100/0/threaded
- cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*