wid-sec-w-2022-0005
Vulnerability from csaf_certbund
Published
2022-04-03 22:00
Modified
2024-05-23 22:00
Summary
zlib: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die zlib ist eine freie Programmbibliothek zum Komprimieren und Dekomprimieren von Daten.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in zlib ausnutzen, um beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Appliance
- Hardware Appliance
- Linux
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die zlib ist eine freie Programmbibliothek zum Komprimieren und Dekomprimieren von Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in zlib ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Hardware Appliance\n- Linux\n- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0005 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0005.json" }, { "category": "self", "summary": "WID-SEC-2022-0005 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0005" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4863 vom 2022-06-01", "url": "https://access.redhat.com/errata/RHSA-2022:4863" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4845 vom 2022-05-31", "url": "https://access.redhat.com/errata/RHSA-2022:4845" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5026 vom 2022-06-15", "url": "https://access.redhat.com/errata/RHSA-2022:5026" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4880 vom 2022-06-02", "url": "https://access.redhat.com/errata/RHSA-2022:4880" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4690 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4690" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4691 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4691" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-2201 vom 2022-05-19", "url": "https://linux.oracle.com/errata/ELSA-2022-2201.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4692 vom 2022-05-19", "url": "https://access.redhat.com/errata/RHSA-2022:4692" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4592 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:4592" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4671 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:4671" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4584 vom 2022-05-20", "url": "https://access.redhat.com/errata/RHSA-2022:4584" }, { "category": "external", "summary": "F5 Security Advisory K21548854 vom 2022-05-19", "url": "https://support.f5.com/csp/article/K21548854" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4896 vom 2022-06-03", "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "category": "external", "summary": "Patch genugate 10.0p8 vom 2022-05-17", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genugate-100p8-verfuegbar.html?tx_genusupport_content%5Bidentity%5D=0\u0026tx_genusupport_content%5BsearchTerm%5D=\u0026tx_genusupport_content%5BforcePath%5D=\u0026tx_genusupport_content%5Baction%5D=genuSupportSearch\u0026tx_g" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2265 vom 2022-05-27", "url": "https://access.redhat.com/errata/RHSA-2022:2265" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2264 vom 2022-05-26", "url": "https://access.redhat.com/errata/RHSA-2022:2264" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220526-0009 vom 2022-05-26", "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "category": "external", "summary": "Tenable Security Advisory", "url": "https://www.tenable.com/security/tns-2022-12" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2272 vom 2022-05-26", "url": "https://access.redhat.com/errata/RHSA-2022:2272" }, { "category": "external", "summary": "Tenable Security Advisory", "url": "https://www.tenable.com/security/tns-2022-11" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2268 vom 2022-05-26", "url": "https://access.redhat.com/errata/RHSA-2022:2268" }, { "category": "external", "summary": "IBM Security Bulletin 6589939 vom 2022-05-26", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-operator-and-queue-manager-container-images-are-vulnerable-to-multiple-vulnerabilities-from-gzip-jackson-databind-libssh-gnutls-nettle-and-zlib/" }, { "category": "external", "summary": "Owncloud Security Update", "url": "https://owncloud.com/security-advisories/cve-2018-25032/" }, { "category": "external", "summary": "Red Hat Security Adivisory CVE-2018-25032 vom 2022-04-03", "url": "https://access.redhat.com/security/cve/cve-2018-25032" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-04-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-04-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010586.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-04-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-04-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" }, { "category": "external", "summary": "SUSE Security Advisory vom 2022-04-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010557.html" }, { "category": "external", "summary": "Debian Security Advisory vom 2022-04-03", "url": "https://www.debian.org/security/2022/dsa-5111" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5355-1 vom 2022-04-03", "url": "https://ubuntu.com/security/notices/USN-5355-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5355-2 vom 2022-04-03", "url": "https://ubuntu.com/security/notices/USN-5355-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5359-1 vom 2022-04-03", "url": "https://ubuntu.com/security/notices/USN-5359-1" }, { "category": "external", "summary": "PoC auf Openwall.com vom 2022-04-03", "url": "https://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "category": "external", "summary": "OpenBSD Security Advisory vom 2022-04-03", "url": "https://www.openbsd.org/errata69.html" }, { "category": "external", "summary": "OpenBSD Security Advisory vom 2022-04-03", "url": "https://www.openbsd.org/errata70.html" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-202204-3 vom 2022-04-05", "url": "https://security.archlinux.org/ASA-202204-3" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-22:08.ZLIB vom 2022-04-06", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-22:08.zlib.asc" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1772 vom 2022-04-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1772.html" }, { "category": "external", "summary": "IGEL Security Notice ISN-2022-09 vom 2022-04-08", "url": "https://kb.igel.com/securitysafety/en/isn-2022-09-zlib-vulnerability-57337946.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4985 vom 2022-06-09", "url": "https://access.redhat.com/errata/RHSA-2022:4985" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1061-2 vom 2022-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010707.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5359-2 vom 2022-06-13", "url": "https://ubuntu.com/security/notices/USN-5359-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1591 vom 2022-04-27", "url": "https://access.redhat.com/errata/RHSA-2022:1591" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-1642 vom 2022-04-28", "url": "http://linux.oracle.com/errata/ELSA-2022-1642.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1642 vom 2022-04-28", "url": "https://access.redhat.com/errata/RHSA-2022:1642" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1661 vom 2022-05-02", "url": "https://access.redhat.com/errata/RHSA-2022:1661" }, { "category": "external", "summary": "Genua Update Seite", "url": "https://kunde.genua.de/nc/suche/view/neuer-patch-genuscreen-box-crypt-card-wall-76p7-verfuegbar.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-044 vom 2022-05-04", "url": "https://downloads.avaya.com/css/P8/documents/101081674" }, { "category": "external", "summary": "Debian Security Advisory DLA-2993 vom 2022-05-07", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1679 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1679" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2218 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2218" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2183 vom 2022-05-11", "url": "https://access.redhat.com/errata/RHSA-2022:2183" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2192 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2192" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2197 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2197" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2198 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2198" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2201 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2201" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2213 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2213" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2214 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2214" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2216 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:2217 vom 2022-05-12", "url": "https://access.redhat.com/errata/RHSA-2022:2217" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-2213 vom 2022-05-12", "url": "http://linux.oracle.com/errata/ELSA-2022-2213.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:2213 vom 2022-05-13", "url": "https://lists.centos.org/pipermail/centos-announce/2022-May/073584.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-064 vom 2022-05-12", "url": "https://downloads.avaya.com/css/P8/documents/101081774" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-063 vom 2022-06-21", "url": "https://downloads.avaya.com/css/P8/documents/101082339" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5192 vom 2022-06-25", "url": "https://access.redhat.com/errata/RHSA-2022:5192" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2174-1 vom 2022-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011348.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5188 vom 2022-06-25", "url": "https://access.redhat.com/errata/RHSA-2022:5188" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5187 vom 2022-06-25", "url": "https://access.redhat.com/errata/RHSA-2022:5187" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5439 vom 2022-07-01", "url": "https://access.redhat.com/errata/RHSA-2022:5439" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-4584 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-4584.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5483 vom 2022-07-01", "url": "https://access.redhat.com/errata/RHSA-2022:5483" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-4592 vom 2022-07-01", "url": "http://linux.oracle.com/errata/ELSA-2022-4592.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1602 vom 2022-07-07", "url": "https://alas.aws.amazon.com/ALAS-2022-1602.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9565 vom 2022-07-07", "url": "https://linux.oracle.com/errata/ELSA-2022-9565.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-100 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-100.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220729-0004 vom 2022-08-19", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "category": "external", "summary": "IBM Security Bulletin 6824729 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-content-manager-ondemand-for-multiplatforms-is-affected-by-a-vulnerability-cve-2018-25032/" }, { "category": "external", "summary": "IBM Security Bulletin 6824731 vom 2022-09-29", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-content-manager-ondemand-for-ibm-i-is-affected-by-a-vulnerability-cve-2018-25032/" }, { "category": "external", "summary": "IBM Security Bulletin 6824891 vom 2022-09-28", "url": "https://aix.software.ibm.com/aix/efixes/security/zlib_advisory.asc" }, { "category": "external", "summary": "IBM Security Bulletin 6823767 vom 2022-09-30", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-is-vulnerable-to-an-issue-within-the-zlib-library-cve-2018-25032/" }, { "category": "external", "summary": "IBM Security Bulletin 6825735 vom 2022-10-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-monitoring-basic-services-is-vulnerable-to-a-denial-of-service-attack-in-zlib-component-cve-2018-25032/" }, { "category": "external", "summary": "Autodesk Security Advisory ADSK-SA-2022-0023 vom 2022-10-07", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0023" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release" }, { "category": "external", "summary": "IBM Security Bulletin 6831855 vom 2022-10-26", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-14/" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-42 vom 2022-10-31", "url": "https://security.gentoo.org/glsa/202210-42" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-159 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-159.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-158 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-158.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7813 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7813" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8420 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8420" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-8420 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-8420.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1640 vom 2022-12-10", "url": "https://alas.aws.amazon.com/ALAS-2022-1640.html" }, { "category": "external", "summary": "IBM Security Bulletin 6847653 vom 2022-12-20", "url": "https://www.ibm.com/support/pages/node/6847653" }, { "category": "external", "summary": "IBM Security Bulletin 6833196 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6846533" }, { "category": "external", "summary": "IBM Security Bulletin 6827869 vom 2022-12-23", "url": "https://www.ibm.com/support/pages/node/6842075" }, { "category": "external", "summary": "IBM Security Bulletin 6855297 vom 2023-01-13", "url": "https://www.ibm.com/support/pages/node/6855297" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0976 vom 2023-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:0976" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0975 vom 2023-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:0975" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0943 vom 2023-02-28", "url": "https://access.redhat.com/errata/RHSA-2023:0943" }, { "category": "external", "summary": "IBM Security Bulletin 7111596 vom 2024-01-24", "url": "https://www.ibm.com/support/pages/node/7111596" }, { "category": "external", "summary": "Sophos UTM Up2date 9.715 vom 2023-03-13", "url": "https://community.sophos.com/utm-firewall/b/blog/posts/utm-up2date-9-715-released" }, { "category": "external", "summary": "Dell Security Update for Dell NetWorker", "url": "https://www.dell.com/support/kbdoc/de-de/000215499/dsa-2023-231-security-update-for-dell-networker-zlib-1-2-3" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "ORACLE OVMSA-2023-0011 vom 2023-08-17", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2023-August/001074.html" }, { "category": "external", "summary": "IBM Security Bulletin 7087162 vom 2023-12-01", "url": "https://www.ibm.com/support/pages/node/7087162" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6736-1 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6736-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6736-2 vom 2024-05-23", "url": "https://ubuntu.com/security/notices/USN-6736-2" } ], "source_lang": "en-US", "title": "zlib: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-05-23T22:00:00.000+00:00", "generator": { "date": "2024-05-24T08:08:56.825+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0005", "initial_release_date": "2022-04-03T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Arch Linux aufgenommen" }, { "date": "2022-04-05T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von FreeBSD aufgenommen" }, { "date": "2022-04-06T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2022-04-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-04-18T22:00:00.000+00:00", "number": "7", "summary": "Referenz(en) aufgenommen: FEDORA-2022-DBD2935E44, FEDORA-2022-413A80A102, FEDORA-2022-12B89E2AAD" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-05-01T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates aufgenommen" }, { "date": "2022-05-05T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-05-08T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-11T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-12T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-05-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von CentOS und AVAYA aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von genua aufgenommen" }, { "date": "2022-05-18T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-05-19T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-24T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat, NetApp, Tenable und IBM aufgenommen" }, { "date": "2022-05-31T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-01T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-06T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-09T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-12T22:00:00.000+00:00", "number": "27", "summary": "Referenz(en) aufgenommen: FEDORA-2022-61CF1C64F6" }, { "date": "2022-06-13T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-14T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-06-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-06-26T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2022-06-30T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-07T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-10T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-11T22:00:00.000+00:00", "number": "37", "summary": "Referenz(en) aufgenommen: FEDORA-2022-3A92250FD5, FEDORA-2022-B58A85E167" }, { "date": "2022-08-21T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-09-29T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-09T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Autodesk aufgenommen" }, { "date": "2022-10-12T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-11T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "51", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-12-22T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-01-12T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-02-28T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-03-13T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates aufgenommen" }, { "date": "2023-07-04T22:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "57", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-08-17T22:00:00.000+00:00", "number": "58", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2023-12-03T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-24T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-23T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "62" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Autodesk AutoCAD", "product": { "name": "Autodesk AutoCAD", "product_id": "T024716", "product_identification_helper": { "cpe": "cpe:/a:autodesk:autocad:2023.1.1" } } } ], "category": "vendor", "name": "Autodesk" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Device Services", "product": { "name": "Avaya Aura Device Services", "product_id": "T015517", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_device_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Breeze Platform", "product": { "name": "Avaya Breeze Platform", "product_id": "T015823", "product_identification_helper": { "cpe": "cpe:/a:avaya:breeze_platform:-" } } }, { "category": "product_name", "name": "Avaya CMS", "product": { "name": "Avaya CMS", "product_id": "997", "product_identification_helper": { "cpe": "cpe:/a:avaya:call_management_system_server:-" } } }, { "category": "product_name", "name": "Avaya Session Border Controller", "product": { "name": "Avaya Session Border Controller", "product_id": "T015520", "product_identification_helper": { "cpe": "cpe:/h:avaya:session_border_controller:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.9.0.1", "product": { "name": "Dell NetWorker \u003c19.9.0.1", "product_id": "T028404", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.9.0.1" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "IBM AIX", "product": { "name": "IBM AIX", "product_id": "5094", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:-" } } }, { "category": "product_name", "name": "IBM Content Manager", "product": { "name": "IBM Content Manager", "product_id": "T023838", "product_identification_helper": { "cpe": "cpe:/a:ibm:content_manager:-" } } }, { "branches": [ { "category": "product_version", "name": "11.1", "product": { "name": "IBM DB2 11.1", "product_id": "342000", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.1" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM DB2 11.5", "product_id": "T015242", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:v11.5" } } }, { "category": "product_version", "name": "10.5", "product": { "name": "IBM DB2 10.5", "product_id": "T015244", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:v10.5" } } } ], "category": "product_name", "name": "DB2" }, { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version", "name": "7.4", "product": { "name": "IBM QRadar SIEM 7.4", "product_id": "T024775", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.0.5-ISS-ISVA-FP000", "product": { "name": "IBM Security Verify Access \u003c10.0.5-ISS-ISVA-FP000", "product_id": "T025829", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.5-iss-isva-fp000" } } } ], "category": "product_name", "name": "Security Verify Access" }, { "branches": [ { "category": "product_version", "name": "8.1.17", "product": { "name": "IBM Spectrum Protect 8.1.17", "product_id": "T025663", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1.17" } } }, { "category": "product_version", "name": "for Virtual Environments", "product": { "name": "IBM Spectrum Protect for Virtual Environments", "product_id": "T025697", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_virtual_environments" } } }, { "category": "product_version", "name": "for Space Management Client", "product": { "name": "IBM Spectrum Protect for Space Management Client", "product_id": "T025698", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:for_space_management_client" } } } ], "category": "product_name", "name": "Spectrum Protect" }, { "branches": [ { "category": "product_version", "name": "6.2.0", "product": { "name": "IBM Tivoli Business Service Manager 6.2.0", "product_id": "T014092", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0" } } } ], "category": "product_name", "name": "Tivoli Business Service Manager" }, { "category": "product_name", "name": "IBM Tivoli Monitoring", "product": { "name": "IBM Tivoli Monitoring", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } }, { "category": "product_name", "name": "IBM VIOS", "product": { "name": "IBM VIOS", "product_id": "T004571", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c22.2R1", "product": { "name": "Juniper Junos Space \u003c22.2R1", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T016960", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c1.2.12", "product": { "name": "Open Source zlib \u003c1.2.12", "product_id": "T022501", "product_identification_helper": { "cpe": "cpe:/a:gnu:zlib:1.2.12" } } } ], "category": "product_name", "name": "zlib" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version", "name": "3", "product": { "name": "Oracle VM 3", "product_id": "T019617", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:3" } } } ], "category": "product_name", "name": "VM" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9.7 MR15", "product": { "name": "Sophos Unified Threat Management (UTM) Software 9.7 MR15", "product_id": "T026721", "product_identification_helper": { "cpe": "cpe:/a:sophos:unified_threat_management_software:9.7_mr15" } } } ], "category": "product_name", "name": "Unified Threat Management (UTM) Software" } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus", "product": { "name": "Tenable Security Nessus", "product_id": "T016399", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:-" } } } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.0p8", "product": { "name": "genua genugate \u003c10.0p8", "product_id": "T023260", "product_identification_helper": { "cpe": "cpe:/h:genua:genugate:10.0:p8" } } } ], "category": "product_name", "name": "genugate" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.6p7", "product": { "name": "genua genuscreen \u003c7.6p7", "product_id": "T023070", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:7.6p7" } } }, { "category": "product_version_range", "name": "\u003c8.0p4", "product": { "name": "genua genuscreen \u003c8.0p4", "product_id": "T023071", "product_identification_helper": { "cpe": "cpe:/h:genua:genuscreen:8.0p4" } } } ], "category": "product_name", "name": "genuscreen" } ], "category": "vendor", "name": "genua" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in zlib, welche auf einen Out-of-Bounds-Zugriff zur\u00fcckzuf\u00fchren ist. Bei der Kompression von Benutzereingaben kann dieser Zustand auftreten. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T003343", "67646", "4035", "T015823", "T015844", "T015127", "T015126", "T004914", "T015520", "T015244", "T016399", "T025829", "T015242", "T014092", "997", "T025697", "T026721", "T028404", "T001663", "T019617", "398363", "T025698", "342008", "T021398", "T004571", "T015519", "T015518", "342000", "T015517", "T015516", "T013312", "T005119", "T012167", "T023838", "T016960", "5094", "T016243", "T022954", "T024716", "2951", "T002207", "T017865", "T000126", "T025663", "T024775", "1727" ] }, "release_date": "2022-04-03T22:00:00Z", "title": "CVE-2018-25032" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.