Vulnerability Details : CVE-2005-2096
zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2005-2096
- cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2096
35.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2005-2096
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2005-2096
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
404 Not Found
-
http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
Page not found
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
-
http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
-
http://www.vupen.com/english/advisories/2006/0144
Site en construction
-
http://www.securityfocus.com/archive/1/482601/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
404 Not Found
-
https://usn.ubuntu.com/148-1/
404: Page not found | Ubuntu
-
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
Apple - Lists.apple.com
-
http://www.ubuntulinux.org/usn/usn-151-3
USN-151-3: zlib vulnerabilities | Ubuntu security notices | Ubuntu
-
http://securitytracker.com/id?1014398
Access DeniedVendor Advisory
-
http://www.securityfocus.com/archive/1/464745/100/0/threaded
-
http://www.debian.org/security/2006/dsa-1026
[SECURITY] [DSA 1026-1] New sash packages fix potential arbitrary code execution
-
http://www.vupen.com/english/advisories/2005/0978
Site en construction
-
http://www.securityfocus.com/archive/1/482949/100/0/threaded
-
http://www.securityfocus.com/archive/1/482950/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
404 Not Found
-
http://www.redhat.com/support/errata/RHSA-2005-569.html
SupportPatch;Vendor Advisory
-
http://support.apple.com/kb/HT3298
About the security content of Safari 3.2 - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
Mandriva
-
http://www.kb.cert.org/vuls/id/680620
VU#680620 - zlib inflate() routine vulnerable to buffer overflowThird Party Advisory;US Government Resource
-
http://www.debian.org/security/2005/dsa-740
[SECURITY] [DSA 740-1] New zlib packages fix denial of servicePatch;Vendor Advisory
-
http://security.gentoo.org/glsa/glsa-200507-05.xml
zlib: Buffer overflow (GLSA 200507-05) — Gentoo securityPatch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/482505/100/0/threaded
-
http://www.debian.org/security/2005/dsa-797
[SECURITY] [DSA 797-1] New zsync packages fix DOSPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
Mandriva
-
http://www.securityfocus.com/archive/1/421411/100/0/threaded
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
Mandriva
-
http://www.vupen.com/english/advisories/2007/1267
Site en construction
-
http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
Qt: Buffer overflow in the included zlib library (GLSA 200509-18) — Gentoo securityPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2008-0629.html
Support
-
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
Vendor Advisory
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
162391 – CAN-2005-2096 zlib buffer overflowVendor Advisory
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
HP-UX Secure Shell denial of service undefined Vulnerability Report
-
http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
Page not found
-
http://www.securityfocus.com/bid/14162
Patch
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
162680 – CAN-2005-2096 zlib buffer overflowVendor Advisory
-
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/482571/100/0/threaded
-
http://www.securityfocus.com/archive/1/482503/100/0/threaded
Jump to