VuXML ID | Description |
262b92fe-81c8-11e1-8899-001ec9578670 | png -- memory corruption/possible remote code execution
The PNG project reports:
libpng fails to correctly handle malloc() failures for text
chunks (in png_set_text_2()), which can lead to memory
corruption and the possibility of remote code execution.
Discovery 2012-03-29 Entry 2012-04-08 png
linux-f10-png
< 1.4.11
CVE-2011-3048
http://www.libpng.org/pub/png/libpng.html
|
57c705d6-12ae-11dd-bab7-0016179b2dd5 | png -- unknown chunk processing uninitialized memory access
Secunia reports:
Tavis Ormandy has reported a vulnerability in libpng, which can be
exploited by malicious people to cause a Denial of Service, disclose
potentially sensitive information, or potentially compromise an
application using the library.
The vulnerability is caused due to the improper handling of PNG
chunks unknown to the library. This can be exploited to trigger the
use of uninitialized memory in e.g. a free() call via unknown PNG
chunks having a length of zero.
Successful exploitation may allow execution of arbitrary code, but
requires that the application calls the png_set_read_user_chunk_fn()
function or the png_set_keep_unknown_chunks() function under
specific conditions.
Discovery 2008-04-12 Entry 2008-04-25 Modified 2008-04-29 png
< 1.2.27
CVE-2008-1382
28770
http://secunia.com/advisories/29792
http://libpng.sourceforge.net/Advisory-1.2.26.txt
|
172acf78-780c-11dc-b3f4-0016179b2dd5 | png -- multiple vulnerabilities
A Secunia Advisory reports:
Some vulnerabilities have been reported in libpng, which can be
exploited by malicious people to cause a DoS (Denial of
Service).
Certain errors within libpng, including a logical NOT instead of a
bitwise NOT in pngtrtran.c, an error in the 16bit cheap transparency
extension, and an incorrect use of sizeof() may be exploited to
crash an application using the library.
Various out-of-bounds read errors exist within the functions
png_handle_pCAL(), png_handle_sCAL(), png_push_read_tEXt(),
png_handle_iTXt(), and png_handle_ztXt(), which may be exploited by
exploited to crash an application using the library.
The vulnerability is caused due to an off-by-one error within
the ICC profile chunk handling, which potentially can be
exploited to crash an application using the library.
Discovery 2007-10-08 Entry 2007-10-11 png
< 1.2.22
http://secunia.com/advisories/27093/
http://secunia.com/advisories/27130/
CVE-2007-5267
CVE-2007-5266
CVE-2007-5268
CVE-2007-5269
|
edef3f2f-82cf-11df-bcce-0018f3e2eb82 | png -- libpng decompression buffer overflow
The PNG project describes the problem in an advisory:
Several versions of libpng through 1.4.2 (and through 1.2.43
in the older series) contain a bug whereby progressive
applications such as web browsers (or the rpng2 demo app included
in libpng) could receive an extra row of image data beyond the
height reported in the header, potentially leading to an
out-of-bounds write to memory (depending on how the application
is written) and the possibility of execution of an attacker's
code with the privileges of the libpng user (including remote
compromise in the case of a libpng-based browser visiting a
hostile web site).
Discovery 2010-03-30 Entry 2010-06-28 Modified 2010-06-28 png
< 1.4.3
41174
CVE-2010-1205
http://www.libpng.org/pub/png/libpng.html
|
c564f9bd-8ba7-11e4-801f-0022156e8794 | png -- heap overflow for 32-bit builds
32-bit builds of PNG library are vulnerable to an unsigned
integer overflow that is triggered by a crafted wide
interlaced images.
Overflow results in a heap corruption that will crash the
application and may lead to the controlled overwrite of a
selected portions of process address space.
Discovery 2014-12-23 Entry 2015-01-05 png
ge 1.2.6 lt 1.5.21
ge 1.6 lt 1.6.16
http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
http://codelabs.ru/security/vulns/analysis/libpng/2014-dec-libpng-1.6.15/
|
1886e195-8b87-11e5-90e7-b499baebfeaf | libpng buffer overflow in png_set_PLTE
libpng reports:
CVE for a vulnerability in libpng, all versions, in the
png_set_PLTE/png_get_PLTE functions. These functions failed to check for
an out-of-range palette when reading or writing PNG files with a bit_depth
less than 8. Some applications might read the bit depth from the IHDR
chunk and allocate memory for a 2^N entry palette, while libpng can return
a palette with up to 256 entries even when the bit depth is less than 8.
Discovery 2015-11-15 Entry 2015-11-15 Modified 2015-12-08 png
< 1.6.20
http://www.openwall.com/lists/oss-security/2015/11/12/2
http://www.openwall.com/lists/oss-security/2015/12/03/6
CVE-2015-8126
CVE-2015-8472
|