Last modified: 2006-02-22 21:15:11 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T4787, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 2787 - CAN-2005-2096 zlib arbitrary code execution vulnerability
CAN-2005-2096 zlib arbitrary code execution vulnerability
Status: RESOLVED INVALID
Product: Wikimedia
Classification: Unclassified
General/Unknown (Other open bugs)
unspecified
All Windows XP
: Normal normal (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2005-07-10 14:39 UTC by Jamesday
Modified: 2006-02-22 21:15 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Jamesday 2005-07-10 14:39:36 UTC
CAN-2005-2096 ( http://cve.mitre.org/cgi-bin/cvename.cgi?
name=CAN-2005-2096 )
reports a new zlib crafted data vulnerability which results 
in a buffer overflow
and arbitrary code execution. No exploits yet reported.

Other references:

 http://secunia.com/advisories/15949/

Possible fix (not official zlib fix):

 http://it.slashdot.org/comments.pl?sid=155369&cid=13025936
Comment 1 Antoine "hashar" Musso (WMF) 2005-07-12 11:56:08 UTC
http://www.zlib.net/
Only 1.2.1 & 1.2.2 affected.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links