Open source data compression is unsecure

A security flaw in a widely-used open-source data compression technology could put users at risk of attack.

A security flaw in a widely-used open-source data compression technology could put users at risk of attack.

Security research company Secunia said a buffer overflow vulnerability exists in the open-source “zlib” standard.

Using malicious code an attacker could take control of a user’s PC if it uses the compression technology.

Zlib is used in a variety of open-source and proprietary software applications, including Linux, FreeBSD, Microsoft Office, MSN Messenger, and Internet Explorer.

Microsoft said up-to-date versions of its software did not appear to be affected, and patches for the likes of SUSE Linux, Red Hat and Debian already exist.

The flaw is said to affect version 1.2.2 of zlib, and its creators are already working on an update which will not be vulnerable to the buffer overflow flaw.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Operating systems software

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close