CVE-2016-9840

Summary

CVECVE-2016-9840
StatePUBLISHED
Assignermicrofocus
Source PriorityCVE Program / NVD first with legacy fallback
Published2017-05-23 04:29:01 UTC
Updated2025-04-20 01:37:25 UTC
Descriptioninftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.

Risk And Classification

Primary CVSS: v3.1 8.8 HIGH from [email protected]

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem Types: NVD-CWE-noinfo | n/a


VersionSourceTypeScoreSeverityVector
3.1[email protected]Primary8.8HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.0[email protected]Primary6.8AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial

AV:N/AC:M/Au:N/C:P/I:P/A:P

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Apple Iphone Os All All All All
Operating System Apple Mac Os X All All All All
Operating System Apple Tvos All All All All
Operating System Apple Watchos All All All All
Application Boost Boost All All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 18.04 All All All
Operating System Debian Debian Linux 8.0 All All All
Application Nodejs Node.js All All All All
Application Nodejs Node.js All All All All
Application Nodejs Node.js All All All All
Operating System Opensuse Leap 42.1 All All All
Operating System Opensuse Leap 42.2 All All All
Operating System Opensuse Opensuse 13.2 All All All
Application Oracle Database Server 18c All All All
Application Oracle Jdk 1.6.0 update161 All All
Application Oracle Jdk 1.7.0 update151 All All
Application Oracle Jdk 1.8.0 update144 All All
Application Oracle Jre 1.6.0 update161 All All
Application Oracle Jre 1.7.0 update151 All All
Application Oracle Jre 1.8.0 update144 All All
Application Oracle Mysql All All All All
Application Oracle Mysql All All All All
Application Oracle Mysql All All All All
Application Oracle Mysql All All All All
Operating System Redhat Enterprise Linux Desktop 6.0 All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Eus 7.4 All All All
Operating System Redhat Enterprise Linux Eus 7.5 All All All
Operating System Redhat Enterprise Linux Server 6.0 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Workstation 6.0 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Application Redhat Satellite 5.8 All All All
Application Zlib Zlib All All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Na N/a affected n/a Not specified

References

ReferenceSourceLinkTags
CPU Oct 2018 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com Third Party Advisory
wiki.mozilla.org/images/0/09/Zlib-report.pdf af854a3a-2127-422b-91ae-364da2661108 wiki.mozilla.org Broken Link
Remove offset pointer optimization in inftrees.c. · madler/zlib@6a04314 · GitHub af854a3a-2127-422b-91ae-364da2661108 github.com Patch, Third Party Advisory
openSUSE-SU-2017:0080-1: moderate: Security update for zlib af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
oss-security - Re: CVE Request: zlib security issues found during audit af854a3a-2127-422b-91ae-364da2661108 www.openwall.com Mailing List, Third Party Advisory
openSUSE-SU-2017:0077-1: moderate: Security update for zlib af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Bug 1402345 – CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c af854a3a-2127-422b-91ae-364da2661108 bugzilla.redhat.com Issue Tracking, Third Party Advisory
zlib: Multiple vulnerabilities (GLSA 201701-56) — Gentoo Security af854a3a-2127-422b-91ae-364da2661108 security.gentoo.org Third Party Advisory
About the security content of tvOS 11 - Apple Support af854a3a-2127-422b-91ae-364da2661108 support.apple.com Third Party Advisory
USN-4246-1: zlib vulnerabilities | Ubuntu security notices | Ubuntu af854a3a-2127-422b-91ae-364da2661108 usn.ubuntu.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Apple macOS/OS X Multiple Flaws Let Remote and Local Users Bypass Security and Deny Service, Local Users Obtain Potentially Sensitive Information, and Applications Gain Elevated Privileges - SecurityTracker af854a3a-2127-422b-91ae-364da2661108 www.securitytracker.com Broken Link
openSUSE-SU-2016:3202-1: moderate: Security update for zlib af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
rsync: Multiple vulnerabilities (GLSA 202007-54) — Gentoo security af854a3a-2127-422b-91ae-364da2661108 security.gentoo.org Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Oracle Critical Patch Update - October 2017 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com Third Party Advisory
USN-4292-1: rsync vulnerabilities | Ubuntu security notices af854a3a-2127-422b-91ae-364da2661108 usn.ubuntu.com Third Party Advisory
[SECURITY] [DLA 2085-1] zlib security update af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List, Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
About the security content of macOS High Sierra 10.13 - Apple Support af854a3a-2127-422b-91ae-364da2661108 support.apple.com Third Party Advisory
About the security content of iOS 11 - Apple Support af854a3a-2127-422b-91ae-364da2661108 support.apple.com Third Party Advisory
zlib Multiple Denial of Service Vulnerabilities af854a3a-2127-422b-91ae-364da2661108 www.securityfocus.com Broken Link
[SECURITY] [DLA 1725-1] rsync security update af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List, Third Party Advisory
MOSS/Secure Open Source/Completed - MozillaWiki af854a3a-2127-422b-91ae-364da2661108 wiki.mozilla.org Third Party Advisory
Oracle Critical Patch Update Advisory - July 2020 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com Third Party Advisory
About the security content of watchOS 4 - Apple Support af854a3a-2127-422b-91ae-364da2661108 support.apple.com Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 376056 IBM Cognos Analytics Multiple Vulnerabilities (566643)
  • 591311 Bosch Rexroth PRA-ES8P2S Ethernet-Switch Multiple Vulnerabilities (BOSCH-SA-247053-BT)
  • 672209 EulerOS Security Update for mariadb (EulerOS-SA-2022-2473)
  • 672276 EulerOS Security Update for mariadb-connector-c (EulerOS-SA-2022-2691)
  • 672283 EulerOS Security Update for mariadb-connector-c (EulerOS-SA-2022-2659)
  • 672339 EulerOS Security Update for mariadb-connector-c (EulerOS-SA-2022-2771)
  • 672376 EulerOS Security Update for deltarpm (EulerOS-SA-2022-2723)
  • 672379 EulerOS Security Update for deltarpm (EulerOS-SA-2022-2758)
  • 672381 EulerOS Security Update for mariadb-connector-c (EulerOS-SA-2022-2736)
  • 672438 EulerOS Security Update for deltarpm (EulerOS-SA-2022-2841)
  • 672469 EulerOS Security Update for deltarpm (EulerOS-SA-2022-2816)
  • 673347 EulerOS Security Update for syslinux (EulerOS-SA-2023-2871)
  • 673665 EulerOS Security Update for syslinux (EulerOS-SA-2023-2910)
  • 673865 EulerOS Security Update for syslinux (EulerOS-SA-2023-2826)
  • 690462 Free Berkeley Software Distribution (FreeBSD) Security Update for net/rsync (085399ab-dfd7-11ea-96e4-80ee73bc7b66)
  • 710349 Gentoo Linux zlib Multiple Vulnerabilities (GLSA 201701-56)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report