TROYANOSYVIRUS
Volver a CVEs

CVE-2016-9841

CRITICAL
9.8

Descripcion

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/23/2017
Ultima modificacion4/20/2025
Fuentenvd
Avistamientos honeypot0

Productos afectados

apple:iphone_osapple:mac_os_xapple:tvosapple:watchoscanonical:ubuntu_linuxdebian:debian_linuxnetapp:active_iq_unified_managernetapp:cloud_backupnetapp:e-series_santricity_managementnetapp:e-series_santricity_os_controllernetapp:e-series_santricity_storage_managernetapp:e-series_santricity_web_servicesnetapp:hci_storage_nodenetapp:oncommand_balancenetapp:oncommand_insightnetapp:oncommand_performance_managernetapp:oncommand_shiftnetapp:oncommand_unified_managernetapp:oncommand_workflow_automationnetapp:snapmanagernetapp:solidfirenetapp:steelstore_cloud_integrated_storagenetapp:storage_replication_adapter_for_clustered_data_ontapnetapp:symantec_netbackupnetapp:vasa_provider_for_clustered_data_ontapnetapp:virtual_storage_consolenodejs:node.jsopensuse:leapopensuse:opensuseoracle:database_serveroracle:jdkoracle:jreoracle:mysqlredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_workstationredhat:satellitezlib:zlib

Referencias

https://support.apple.com/HT208112(security@opentext.com)
https://support.apple.com/HT208113(security@opentext.com)
https://support.apple.com/HT208115(security@opentext.com)
https://support.apple.com/HT208144(security@opentext.com)
https://usn.ubuntu.com/4246-1/(security@opentext.com)
https://usn.ubuntu.com/4292-1/(security@opentext.com)
http://www.openwall.com/lists/oss-security/2016/12/05/21(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/95131(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039427(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1039596(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1220(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1221(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1222(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2999(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3046(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3047(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3453(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1402346(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-56(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202007-54(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20171019-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208112(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208113(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208115(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208144(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4246-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4292-1/(af854a3a-2127-422b-91ae-364da2661108)
https://wiki.mozilla.org/images/0/09/Zlib-report.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.