CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.4%
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
Vendor | Product | Version | CPE |
---|---|---|---|
zlib | zlib | * | cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:* |
opensuse | leap | 42.1 | cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* |
opensuse | leap | 42.2 | cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* |
opensuse | opensuse | 13.2 | cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* |
canonical | ubuntu_linux | 18.04 | cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
oracle | database_server | 18c | cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:* |
oracle | jdk | 1.6.0 | cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:* |
oracle | jdk | 1.7.0 | cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:* |
lists.opensuse.org/opensuse-updates/2016-12/msg00127.html
lists.opensuse.org/opensuse-updates/2017-01/msg00050.html
lists.opensuse.org/opensuse-updates/2017-01/msg00053.html
www.openwall.com/lists/oss-security/2016/12/05/21
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
www.securityfocus.com/bid/95131
www.securitytracker.com/id/1039427
www.securitytracker.com/id/1041888
access.redhat.com/errata/RHSA-2017:1220
access.redhat.com/errata/RHSA-2017:1221
access.redhat.com/errata/RHSA-2017:1222
access.redhat.com/errata/RHSA-2017:2999
access.redhat.com/errata/RHSA-2017:3046
access.redhat.com/errata/RHSA-2017:3047
access.redhat.com/errata/RHSA-2017:3453
bugzilla.redhat.com/show_bug.cgi?id=1402351
github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
lists.debian.org/debian-lts-announce/2019/03/msg00027.html
lists.debian.org/debian-lts-announce/2020/01/msg00030.html
security.gentoo.org/glsa/201701-56
security.gentoo.org/glsa/202007-54
security.netapp.com/advisory/ntap-20181018-0002/
support.apple.com/HT208112
support.apple.com/HT208113
support.apple.com/HT208115
support.apple.com/HT208144
usn.ubuntu.com/4246-1/
usn.ubuntu.com/4292-1/
wiki.mozilla.org/images/0/09/Zlib-report.pdf
wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
www.oracle.com/security-alerts/cpujul2020.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.4%