// For flags

CVE-2018-25032

zlib: A flaw found in zlib when compressing (not decompressing) certain inputs

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

zlib versiones anteriores a 1.2.12 permite la corrupciĆ³n de memoria al desinflar (es decir, al comprimir) si la entrada tiene muchas coincidencias distantes

An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-03-25 CVE Reserved
  • 2022-03-25 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-10-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-787: Out-of-bounds Write
CAPEC
References (31)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netapp
Search vendor "Netapp"
H300s Firmware
Search vendor "Netapp" for product "H300s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H300s
Search vendor "Netapp" for product "H300s"
--
Safe
Netapp
Search vendor "Netapp"
H500s Firmware
Search vendor "Netapp" for product "H500s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H500s
Search vendor "Netapp" for product "H500s"
--
Safe
Netapp
Search vendor "Netapp"
H700s Firmware
Search vendor "Netapp" for product "H700s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H700s
Search vendor "Netapp" for product "H700s"
--
Safe
Netapp
Search vendor "Netapp"
H410s Firmware
Search vendor "Netapp" for product "H410s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410s
Search vendor "Netapp" for product "H410s"
--
Safe
Netapp
Search vendor "Netapp"
H410c Firmware
Search vendor "Netapp" for product "H410c Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410c
Search vendor "Netapp" for product "H410c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc622-2c Firmware
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc622-2c
Search vendor "Siemens" for product "Scalance Sc622-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc626-2c Firmware
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc626-2c
Search vendor "Siemens" for product "Scalance Sc626-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc632-2c Firmware
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc632-2c
Search vendor "Siemens" for product "Scalance Sc632-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc636-2c Firmware
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc636-2c
Search vendor "Siemens" for product "Scalance Sc636-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc642-2c Firmware
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc642-2c
Search vendor "Siemens" for product "Scalance Sc642-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc646-2c Firmware
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc646-2c
Search vendor "Siemens" for product "Scalance Sc646-2c"
--
Safe
Zlib
Search vendor "Zlib"
Zlib
Search vendor "Zlib" for product "Zlib"
< 1.2.12
Search vendor "Zlib" for product "Zlib" and version " < 1.2.12"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
>= 10.15 < 10.15.7
Search vendor "Apple" for product "Mac Os X" and version " >= 10.15 < 10.15.7"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-005
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-007
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-002
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-003
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-006
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-007
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-008
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-002
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-003
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
>= 11.0 < 11.6.6
Search vendor "Apple" for product "Macos" and version " >= 11.0 < 11.6.6"
-
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
>= 12.0.0 < 12.4
Search vendor "Apple" for product "Macos" and version " >= 12.0.0 < 12.4"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.7.0 < 3.7.14
Search vendor "Python" for product "Python" and version " >= 3.7.0 < 3.7.14"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.8.0 < 3.8.14
Search vendor "Python" for product "Python" and version " >= 3.8.0 < 3.8.14"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.9.0 < 3.9.13
Search vendor "Python" for product "Python" and version " >= 3.9.0 < 3.9.13"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.10.0 < 3.10.5
Search vendor "Python" for product "Python" and version " >= 3.10.0 < 3.10.5"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.3.0 < 10.3.36
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.3.0 < 10.3.36"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.4.0 < 10.4.26
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.4.0 < 10.4.26"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.5.0 < 10.5.17
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.5.0 < 10.5.17"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.6.0 < 10.6.9
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.6.0 < 10.6.9"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.7.0 < 10.7.5
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.7.0 < 10.7.5"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.8.0 < 10.8.4
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.8.0 < 10.8.4"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.9.0 < 10.9.2
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.9.0 < 10.9.2"
-
Affected
Netapp
Search vendor "Netapp"
Active Iq Unified Manager
Search vendor "Netapp" for product "Active Iq Unified Manager"
-vmware_vsphere
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Os Controller
Search vendor "Netapp" for product "E-series Santricity Os Controller"
>= 11.0.0 <= 11.70.2
Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0.0 <= 11.70.2"
-
Affected
Netapp
Search vendor "Netapp"
Management Services For Element Software
Search vendor "Netapp" for product "Management Services For Element Software"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Workflow Automation
Search vendor "Netapp" for product "Oncommand Workflow Automation"
--
Affected
Netapp
Search vendor "Netapp"
Ontap Select Deploy Administration Utility
Search vendor "Netapp" for product "Ontap Select Deploy Administration Utility"
--
Affected
Netapp
Search vendor "Netapp"
Hci Compute Node
Search vendor "Netapp" for product "Hci Compute Node"
--
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
6.45
Search vendor "Azul" for product "Zulu" and version "6.45"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
7.52
Search vendor "Azul" for product "Zulu" and version "7.52"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
8.60
Search vendor "Azul" for product "Zulu" and version "8.60"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
11.54
Search vendor "Azul" for product "Zulu" and version "11.54"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
13.46
Search vendor "Azul" for product "Zulu" and version "13.46"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
15.38
Search vendor "Azul" for product "Zulu" and version "15.38"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
17.32
Search vendor "Azul" for product "Zulu" and version "17.32"
-
Affected
Goto
Search vendor "Goto"
Gotoassist
Search vendor "Goto" for product "Gotoassist"
< 11.9.18
Search vendor "Goto" for product "Gotoassist" and version " < 11.9.18"
-
Affected