Note: This is an archival copy of Security Sun Alert 228532 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1017430.1. |
Category Security Release Phase Resolved Solaris 7 Operating System Bug Id 4644966, 4644859 Date of Workaround Release 28-MAR-2002 Date of Resolved Release 23-APR-2002 Impact Depending upon how and where the zlib routines are called from an application which links with zlib, the resulting vulnerability may result in a denial of service, information leakage, or execution of arbitrary code. A large number of free applications and libraries have been identified as using zlib at http://www.gzip.org/zlib/apps.html. Some of this freeware is shipped on the Solaris 8 Software Companion CD. This issue is described in the CERT Vulnerability VU#368819 (see http://www.kb.cert.org/vuls/id/368819) which is referenced in CA-2002-07 (see http://www.cert.org/advisories/CA-2002-07.html).
Contributing Factors This issue can occur in the following releases: SPARC Platform
107648-02 through 107648-09 or 107078-19 or 108376-01 through 108376-36
x86 Platform
107649-02 through 107649-09 or 107079-18 or 108377-01 through 108377-32
Notes 1: The vulnerable OpenWindows library (libz) was introduced into OpenWindows 3.6.1 in the feature patches listed above. Prior to installing the feature patch, OpenWindows 3.6.1 was not vulnerable. Solaris 7 and earlier is not vulnerable to this issue as the Solaris libz library was not shipped in Solaris 7 and earlier. Notes 2: The Web download version of GNOME 2.0 for Solaris 8 may install a vulnerable Solaris SUNWzlib package on systems which did not have the SUNWzlib package installed. Solaris 8 systems which were installed with the SUNWCprog, SUNWCuser, or SUNWCreq cluster do not include the SUNWzlib package. To determine which cluster was installed on a Solaris system, execute the following command: $ cat /var/sadm/system/admin/CLUSTER To ensure the security vulnerability is resolved, the patches mentioned above must be installed after a GNOME 2.0 installation. Solaris 9 with GNOME 2.0 is not affected.
Symptoms An application which links with zlib may be able to be killed when handling untrusted zipped input. There are no reliable symptoms to show arbitrary code has been inserted into a running program linked with zlib and executed.
Workaround There is no workaround. Please see "Resolution" section below. Resolution This issue is addressed in the following releases: SPARC Platform
x86 Platform
Modification History Date: 15-APR-2002
Date: 23-APR-2002
Date: 17-APR-2003
References108652-51108376-37 112612-01 108653-41 112611-01 108377-33 Attachments This solution has no attachment |
|