-
Notifications
You must be signed in to change notification settings - Fork 1
Description
Vulnerable Library - zlibv1.2.11
A massively spiffy yet delicately unobtrusive compression library.
Library home page: https://github.com/madler/zlib.git
Found in HEAD commit: a5282c23c8dfeb383a65fba63e7a78f59b9c1c60
Vulnerable Source Files (3)
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (zlibv1.2.11 version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-1744 | 10.0 | zlibv1.2.11 | Direct | N/A | ❌ | |
| CVE-2022-37434 | 9.8 | zlibv1.2.11 | Direct | v1.2.13 | ❌ | |
| WS-2020-0368 | 6.5 | zlibv1.2.11 | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-1744
Vulnerable Library - zlibv1.2.11
A massively spiffy yet delicately unobtrusive compression library.
Library home page: https://github.com/madler/zlib.git
Found in HEAD commit: a5282c23c8dfeb383a65fba63e7a78f59b9c1c60
Found in base branch: develop
Vulnerable Source Files (3)
/zlib/inflate.c
/zlib/inflate.c
/zlib/inflate.c
Vulnerability Details
Out-of-bounds Write vulnerability in radareorg radare2 allows
heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9.
Publish Date: 2025-02-28
URL: CVE-2025-1744
CVSS 3 Score Details (10.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVE-2022-37434
Vulnerable Library - zlibv1.2.11
A massively spiffy yet delicately unobtrusive compression library.
Library home page: https://github.com/madler/zlib.git
Found in HEAD commit: a5282c23c8dfeb383a65fba63e7a78f59b9c1c60
Found in base branch: develop
Vulnerable Source Files (3)
/zlib/inflate.c
/zlib/inflate.c
/zlib/inflate.c
Vulnerability Details
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
Publish Date: 2022-08-05
URL: CVE-2022-37434
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2022-08-05
Fix Resolution: v1.2.13
WS-2020-0368
Vulnerable Library - zlibv1.2.11
A massively spiffy yet delicately unobtrusive compression library.
Library home page: https://github.com/madler/zlib.git
Found in HEAD commit: a5282c23c8dfeb383a65fba63e7a78f59b9c1c60
Found in base branch: develop
Vulnerable Source Files (3)
/zlib/inflate.c
/zlib/inflate.c
/zlib/inflate.c
Vulnerability Details
Zlib in versions v0.8 to v1.2.11 is vulnerable to use-of-uninitialized-value in inflate.
There are a couple of places in inflate() where UPDATE is called with state->check as its first parameter, without a guarantee that this value has been initialized (state comes from a ZALLOC in inflateInit). This causes use of uninitialized check value.
Publish Date: 2020-02-22
URL: WS-2020-0368
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High