CVE-2018-25032

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Overview
  • CVE ID
  • CVE-2018-25032
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Undergoing Analysis
  • Published Version
  • 2022-03-25T09:15:08
  • Last Modified Date
  • 2023-02-11T17:44:46
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:* 1 OR 1.2.12
AND
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.15 10.15.7
cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* 1 OR 11.0 11.6.6
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* 1 OR 12.0.0 12.4
AND
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.7.0 3.7.14
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.8.0 3.8.14
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.9.0 3.9.13
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.10.0 3.10.5
AND
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.3.0 10.3.36
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.4.0 10.4.26
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.5.0 10.5.17
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.6.0 10.6.9
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.7.0 10.7.5
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.8.0 10.8.4
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* 1 OR 10.9.0 10.9.2
AND
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* 1 OR
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* 1 OR 11.0.0 11.70.2
cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
http://seclists.org/fulldisclosure/2022/May/33 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/35 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/May/38 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/03/25/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/03/26/1 Exploit Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 Patch Third Party Advisory
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 Patch Third Party Advisory
https://github.com/madler/zlib/issues/605 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/ Issue Tracking Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/ Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202210-42 Third Party Advisory
https://security.netapp.com/advisory/ntap-20220526-0009/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20220729-0004/ Third Party Advisory
https://support.apple.com/kb/HT213255 Third Party Advisory
https://support.apple.com/kb/HT213256 Third Party Advisory
https://support.apple.com/kb/HT213257 Third Party Advisory
https://www.debian.org/security/2022/dsa-5111 Patch Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/03/24/1 Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/03/28/1 Exploit Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2022/03/28/3 Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2022.html Patch Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-04-04 00:38:46 Added to TrackCVE
2022-12-06 13:15:31 2022-03-25T09:15Z 2022-03-25T09:15:08 CVE Published Date updated
2022-12-06 13:15:31 2022-11-21T19:28:58 CVE Modified Date updated
2022-12-06 13:15:31 Analyzed Vulnerability Status updated
2022-12-06 13:15:38 References updated
2022-12-13 13:17:28 2022-12-13T12:15:25 CVE Modified Date updated
2022-12-13 13:17:28 Analyzed Modified Vulnerability Status updated
2022-12-13 13:17:30 References updated
2022-12-21 07:01:03 Modified Undergoing Analysis Vulnerability Status updated
2023-02-11 18:11:18 2023-02-11T17:44:46 CVE Modified Date updated
2023-02-11 18:11:18 Undergoing Analysis Analyzed Vulnerability Status updated
2023-04-27 17:06:37 Analyzed Undergoing Analysis Vulnerability Status updated