The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
References
Link Providers
http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2016/12/05/21 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html cve-icon cve-icon
http://www.securityfocus.com/bid/95131 cve-icon cve-icon
http://www.securitytracker.com/id/1039427 cve-icon cve-icon
http://www.securitytracker.com/id/1041888 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1220 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1221 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1222 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2999 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3046 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3047 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3453 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1402351 cve-icon cve-icon
https://docs.google.com/document/d/10i1KZS5so8xDqH2rplRa2xet0tyTvvJlLbQQmZIUIKE/edit#heading=h.t13tvnx4loq7 cve-icon
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-9843 cve-icon
https://security.gentoo.org/glsa/201701-56 cve-icon cve-icon
https://security.gentoo.org/glsa/202007-54 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20181018-0002/ cve-icon cve-icon
https://support.apple.com/HT208112 cve-icon cve-icon
https://support.apple.com/HT208113 cve-icon cve-icon
https://support.apple.com/HT208115 cve-icon cve-icon
https://support.apple.com/HT208144 cve-icon cve-icon
https://usn.ubuntu.com/4246-1/ cve-icon cve-icon
https://usn.ubuntu.com/4292-1/ cve-icon cve-icon
https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib cve-icon cve-icon
https://wiki.mozilla.org/images/0/09/Zlib-report.pdf cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-9843 cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: microfocus

Published: 2017-05-23T03:56:00

Updated: 2024-08-06T02:59:03.637Z

Reserved: 2016-12-05T00:00:00

Link: CVE-2016-9843

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-05-23T04:29:01.900

Modified: 2024-11-21T03:01:51.617

Link: CVE-2016-9843

cve-icon Redhat

Severity : Low

Publid Date: 2016-09-29T00:00:00Z

Links: CVE-2016-9843 - Bugzilla