vid-to-speech-api-json icon indicating copy to clipboard operation
vid-to-speech-api-json copied to clipboard

WS-2020-0368 (Medium) detected in zlibv1.2.11

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

WS-2020-0368 - Medium Severity Vulnerability

Vulnerable Library - zlibv1.2.11

A massively spiffy yet delicately unobtrusive compression library.

Library home page: https://github.com/madler/zlib.git

Vulnerable Source Files (2)

/node_modules/grpc/deps/grpc/third_party/zlib/inflate.c /node_modules/grpc/deps/grpc/third_party/zlib/inflate.c

Vulnerability Details

Zlib in versions v0.8 to v1.2.11 is vulnerable to use-of-uninitialized-value in inflate. There are a couple of places in inflate() where UPDATE is called with state->check as its first parameter, without a guarantee that this value has been initialized (state comes from a ZALLOC in inflateInit). This causes use of uninitialized check value.

Publish Date: 2020-02-22

URL: WS-2020-0368

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/WS-2020-0368

Release Date: 2020-02-22

Fix Resolution: cmake-native - 3.15.5;binutils-cross-testsuite - 2.35;libstd-rs - 1.57.0;gdb - 11.1,9.2;tcl - 8.6.11;sudo - 1.8.32;binutils - 2.35,2.28;ccache - 3.3.3,4.1;libgit2 - 1.3.0;cmake - 3.19.5,3.7.0,3.7.2,3.22.0,3.17.3;cmake-native - 3.17.3,3.7.0,3.22.0,3.18.4;ghostscript - 9.55.0


Step up your Open Source Security Game with Mend here