Last modified: 2006-02-22 21:15:11 UTC

Wikimedia Bugzilla is closed!

Wikimedia has migrated from Bugzilla to Phabricator. Bug reports should be created and updated in Wikimedia Phabricator instead. Please create an account in Phabricator and add your Bugzilla email address to it.
Wikimedia Bugzilla is read-only. If you try to edit or create any bug report in Bugzilla you will be shown an intentional error message.
In order to access the Phabricator task corresponding to a Bugzilla report, just remove "static-" from its URL.
You could still run searches in Bugzilla or access your list of votes but bug reports will obviously not be up-to-date in Bugzilla.
Bug 2787 - CAN-2005-2096 zlib arbitrary code execution vulnerability
CAN-2005-2096 zlib arbitrary code execution vulnerability
Status: RESOLVED INVALID
Product: Wikimedia
Classification: Unclassified
General/Unknown (Other open bugs)
unspecified
All Windows XP
: Normal normal (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2005-07-10 14:39 UTC by Jamesday
Modified: 2006-02-22 21:15 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Jamesday 2005-07-10 14:39:36 UTC
CAN-2005-2096 ( http://cve.mitre.org/cgi-bin/cvename.cgi?
name=CAN-2005-2096 )
reports a new zlib crafted data vulnerability which results 
in a buffer overflow
and arbitrary code execution. No exploits yet reported.

Other references:

 http://secunia.com/advisories/15949/

Possible fix (not official zlib fix):

 http://it.slashdot.org/comments.pl?sid=155369&cid=13025936
Comment 1 Antoine "hashar" Musso (WMF) 2005-07-12 11:56:08 UTC
http://www.zlib.net/
Only 1.2.1 & 1.2.2 affected.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links