[24634] in bugtraq

home help back first fref pref prev next nref lref last post

Re: security problem fixed in zlib 1.1.4

daemon@ATHENA.MIT.EDU (Neil W Rickert)
Tue Mar 12 14:12:34 2002

To: bugtraq@securityfocus.com
In-Reply-To: Message from Jean-loup Gailly <jloup@gzip.org> 
   of "Mon, 11 Mar 2002 22:00:21 +0100." <15501.6885.557609.342477@kerla.poseidon-tech.com> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Mon, 11 Mar 2002 19:13:12 -0600
Message-ID: <12790.1015895592@euclid.cs.niu.edu>
From: Neil W Rickert <rickert+bt@cs.niu.edu>

Jean-loup Gailly <jloup@gzip.org> wrote:

>Zlib Advisory 2002-03-11
>zlib Compression Library Corrupts malloc Data Structures via Double Free

A quick note.

Checking the source code from ssh.com, it appears that ssh-1.2.33
comes with included zlib-1.0.4, and ssh-3.1.0 comes with included
zlib-1.1.3 .

Possibly both are vulnerable.

With OpenSSH, you supply a separately installed zlib.  Presumably
versions compiled before today, including those built to handle
the channel.c problem may be vulnerable to the zlib problem.

It would be a sensible idea for people who compiled OpenSSH-3.1p1
last week to install the new zlib and rebuild OpenSSH.

 -NWR



home help back first fref pref prev next nref lref last post