header-logo
Suggest Exploit
vendor:
Compress::Raw::Zlib
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Compress::Raw::Zlib
Affected Version From: Compress::Raw::Zlib prior to 2.017
Affected Version To: Compress::Raw::Zlib prior to 2.017
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Compress::Raw::Zlib Remote Code Execution Vulnerability

The 'Compress::Raw::Zlib' Perl module is prone to a remote code-execution vulnerability. Successful exploits may allow remote attackers to execute arbitrary code or cause denial-of-service conditions in applications that use the vulnerable module.

Mitigation:

Upgrade to Compress::Raw::Zlib version 2.017 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/35307/info


The 'Compress::Raw::Zlib' Perl module is prone to a remote code-execution vulnerability.

Successful exploits may allow remote attackers to execute arbitrary code or cause denial-of-service conditions in applications that use the vulnerable module.

Versions prior to 'Compress::Raw::Zlib' 2.017 are affected.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33032.tar.gz