Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled without vsnprintf or when long inputs are truncated using vsnprintf, allows attackers to cause a denial of service or possibly execute arbitrary code.
http://www.securityfocus.com/bid/6913
http://www.redhat.com/support/errata/RHSA-2003-081.html
http://www.redhat.com/support/errata/RHSA-2003-079.html
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:033
http://www.kb.cert.org/vuls/id/142121
http://www.iss.net/security_center/static/11381.php
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57405
http://marc.info/?l=bugtraq&m=104887247624907&w=2
http://marc.info/?l=bugtraq&m=104620610427210&w=2
http://marc.info/?l=bugtraq&m=104610536129508&w=2
http://marc.info/?l=bugtraq&m=104610337726297&w=2
http://lists.apple.com/mhonarc/security-announce/msg00038.html
http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000066.html
http://jvn.jp/en/jp/JVN78689801/index.html
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000619