iTnews
  • Home
  • News
  • Technology
  • Security

Ancient zlib memory corruption bug sparks security concerns

By Juha Saarinen on Mar 30, 2022 12:01PM
Ancient zlib memory corruption bug sparks security concerns

Compression library is popular everywhere from open source to Microsoft Office.

Security researchers are trying to asses how serious a memory corruption bug in the widely used open source zlib data compression library is, after discovering a fix for the flaw issued in 2018 was never implemented.

Google Project Zero researcher Tavis Ormandy discovered last week that it was possible to cause a reproducible crash for input compression with zlib version 1.2.11, due to a memory corruption bug.

Ormandy found that the issue was in fact a known one. It was introduced 17 years ago in zlib 1.2.2.2, which added the Z_FIXED parameter to force the use of fixed Huffman coding, used for lossless compression.

Although the bug (designated CVE-2018-25032) can cause out-of-bound access that crashes applications, a fix released in 2018 was never implemented in zlib as the latest release of the compression library came out in 2017.

A proof of concept was developed by Ormandy, who together with other security researchers are currently taking stock of the severity of the bug, which currently appears difficult to trigger.

However, an exploit would have far-reaching effects, given its popularity in other open source projects, which would make updating difficult.

The UNIX man page for zlib(3) notes that the compression library is used by a large number of applications:

"zlib is built in to many languages and operating systems, including but not limited to Java, Python, .NET, PHP, Perl, Ruby, Swift, and Go".

Web browsers, Microsoft Office productivity applications, media players and image editors are also known to make use of zlib, which can be found in embedded systems too, making it hard to find for upgrades.

"Let's hope cleaning up old static copies of zlib isn't going to be a mess for years to come," Ormandy wrote on a security mailing list discussing the potential ramifications of the bug.

A fixed version of zlib, 1.2.12, is now available, and users are advised to update to that version of the compression library.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
pkzipsecuritytavis ormandyzlib

Partner Content

The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Mar 30 2022
12:01PM
0 Comments

Related Articles

  • OpenSSL squarely rooted by cert parsing bug
  • Poor patching creates easy zero-day vulnerability reuse
  • Atlassian patches Jira server plugin to fix vulnerability
  • Monash University opens public bug bounty
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.