// For flags

CVE-2018-25032

zlib: A flaw found in zlib when compressing (not decompressing) certain inputs

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

zlib versiones anteriores a 1.2.12 permite la corrupción de memoria al desinflar (es decir, al comprimir) si la entrada tiene muchas coincidencias distantes

An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.

Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2022-03-25 CVE Reserved
  • 2022-03-25 CVE Published
  • 2022-12-14 First Exploit
  • 2025-05-04 EPSS Updated
  • 2025-05-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-787: Out-of-bounds Write
CAPEC
References (33)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netapp
Search vendor "Netapp"
H300s Firmware
Search vendor "Netapp" for product "H300s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H300s
Search vendor "Netapp" for product "H300s"
--
Safe
Netapp
Search vendor "Netapp"
H500s Firmware
Search vendor "Netapp" for product "H500s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H500s
Search vendor "Netapp" for product "H500s"
--
Safe
Netapp
Search vendor "Netapp"
H700s Firmware
Search vendor "Netapp" for product "H700s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H700s
Search vendor "Netapp" for product "H700s"
--
Safe
Netapp
Search vendor "Netapp"
H410s Firmware
Search vendor "Netapp" for product "H410s Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410s
Search vendor "Netapp" for product "H410s"
--
Safe
Netapp
Search vendor "Netapp"
H410c Firmware
Search vendor "Netapp" for product "H410c Firmware"
--
Affected
in Netapp
Search vendor "Netapp"
H410c
Search vendor "Netapp" for product "H410c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc622-2c Firmware
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc622-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc622-2c
Search vendor "Siemens" for product "Scalance Sc622-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc626-2c Firmware
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc626-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc626-2c
Search vendor "Siemens" for product "Scalance Sc626-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc632-2c Firmware
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc632-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc632-2c
Search vendor "Siemens" for product "Scalance Sc632-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc636-2c Firmware
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc636-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc636-2c
Search vendor "Siemens" for product "Scalance Sc636-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc642-2c Firmware
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc642-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc642-2c
Search vendor "Siemens" for product "Scalance Sc642-2c"
--
Safe
Siemens
Search vendor "Siemens"
Scalance Sc646-2c Firmware
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware"
< 3.0
Search vendor "Siemens" for product "Scalance Sc646-2c Firmware" and version " < 3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Scalance Sc646-2c
Search vendor "Siemens" for product "Scalance Sc646-2c"
--
Safe
Zlib
Search vendor "Zlib"
Zlib
Search vendor "Zlib" for product "Zlib"
< 1.2.12
Search vendor "Zlib" for product "Zlib" and version " < 1.2.12"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
11.0
Search vendor "Debian" for product "Debian Linux" and version "11.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
>= 10.15 < 10.15.7
Search vendor "Apple" for product "Mac Os X" and version " >= 10.15 < 10.15.7"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-005
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2020-007
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-002
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-003
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-006
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-007
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2021-008
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-001
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-002
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.15.7
Search vendor "Apple" for product "Mac Os X" and version "10.15.7"
security_update_2022-003
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
>= 11.0 < 11.6.6
Search vendor "Apple" for product "Macos" and version " >= 11.0 < 11.6.6"
-
Affected
Apple
Search vendor "Apple"
Macos
Search vendor "Apple" for product "Macos"
>= 12.0.0 < 12.4
Search vendor "Apple" for product "Macos" and version " >= 12.0.0 < 12.4"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.7.0 < 3.7.14
Search vendor "Python" for product "Python" and version " >= 3.7.0 < 3.7.14"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.8.0 < 3.8.14
Search vendor "Python" for product "Python" and version " >= 3.8.0 < 3.8.14"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.9.0 < 3.9.13
Search vendor "Python" for product "Python" and version " >= 3.9.0 < 3.9.13"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
>= 3.10.0 < 3.10.5
Search vendor "Python" for product "Python" and version " >= 3.10.0 < 3.10.5"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.3.0 < 10.3.36
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.3.0 < 10.3.36"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.4.0 < 10.4.26
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.4.0 < 10.4.26"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.5.0 < 10.5.17
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.5.0 < 10.5.17"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.6.0 < 10.6.9
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.6.0 < 10.6.9"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.7.0 < 10.7.5
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.7.0 < 10.7.5"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.8.0 < 10.8.4
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.8.0 < 10.8.4"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.9.0 < 10.9.2
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.9.0 < 10.9.2"
-
Affected
Netapp
Search vendor "Netapp"
Active Iq Unified Manager
Search vendor "Netapp" for product "Active Iq Unified Manager"
-vmware_vsphere
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Os Controller
Search vendor "Netapp" for product "E-series Santricity Os Controller"
>= 11.0.0 <= 11.70.2
Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0.0 <= 11.70.2"
-
Affected
Netapp
Search vendor "Netapp"
Management Services For Element Software
Search vendor "Netapp" for product "Management Services For Element Software"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Workflow Automation
Search vendor "Netapp" for product "Oncommand Workflow Automation"
--
Affected
Netapp
Search vendor "Netapp"
Ontap Select Deploy Administration Utility
Search vendor "Netapp" for product "Ontap Select Deploy Administration Utility"
--
Affected
Netapp
Search vendor "Netapp"
Hci Compute Node
Search vendor "Netapp" for product "Hci Compute Node"
--
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
6.45
Search vendor "Azul" for product "Zulu" and version "6.45"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
7.52
Search vendor "Azul" for product "Zulu" and version "7.52"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
8.60
Search vendor "Azul" for product "Zulu" and version "8.60"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
11.54
Search vendor "Azul" for product "Zulu" and version "11.54"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
13.46
Search vendor "Azul" for product "Zulu" and version "13.46"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
15.38
Search vendor "Azul" for product "Zulu" and version "15.38"
-
Affected
Azul
Search vendor "Azul"
Zulu
Search vendor "Azul" for product "Zulu"
17.32
Search vendor "Azul" for product "Zulu" and version "17.32"
-
Affected
Goto
Search vendor "Goto"
Gotoassist
Search vendor "Goto" for product "Gotoassist"
< 11.9.18
Search vendor "Goto" for product "Gotoassist" and version " < 11.9.18"
-
Affected