CVE-2002-0059

9.8 CRITICAL
Published: March 15, 2002 Modified: April 16, 2026
View on NVD

Description

The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.cert.org/advisories/CA-2002-07.html
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-122
Source: cve@mitre.org
Broken Link
http://www.kb.cert.org/vuls/id/368819
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-026.html
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-027.html
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/4267
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/8427
Source: cve@mitre.org
Third Party Advisory VDB Entry
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-015.1.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000469
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:022
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.caldera.com/support/security/advisories/CSSA-2002-014.1.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.cert.org/advisories/CA-2002-07.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.debian.org/security/2002/dsa-122
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.kb.cert.org/vuls/id/368819
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-023.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-024.php3
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2002-026.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2002-027.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/4267
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-030
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-036
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTL0204-037
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/8427
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

32 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
28.1%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

zlib