ID CVE-2008-1382
Summary libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
References
Vulnerable Configurations
  • cpe:2.3:a:libpng:libpng:1.0.6:a
    cpe:2.3:a:libpng:libpng:1.0.6:a
  • cpe:2.3:a:libpng:libpng:1.0.6:d
    cpe:2.3:a:libpng:libpng:1.0.6:d
  • cpe:2.3:a:libpng:libpng:1.0.6:e
    cpe:2.3:a:libpng:libpng:1.0.6:e
  • cpe:2.3:a:libpng:libpng:1.0.6:f
    cpe:2.3:a:libpng:libpng:1.0.6:f
  • cpe:2.3:a:libpng:libpng:1.0.6:g
    cpe:2.3:a:libpng:libpng:1.0.6:g
  • cpe:2.3:a:libpng:libpng:1.0.6:h
    cpe:2.3:a:libpng:libpng:1.0.6:h
  • cpe:2.3:a:libpng:libpng:1.0.6:i
    cpe:2.3:a:libpng:libpng:1.0.6:i
  • cpe:2.3:a:libpng:libpng:1.0.6:j
    cpe:2.3:a:libpng:libpng:1.0.6:j
  • cpe:2.3:a:libpng:libpng:1.0.7:beta11
    cpe:2.3:a:libpng:libpng:1.0.7:beta11
  • cpe:2.3:a:libpng:libpng:1.0.7:beta12
    cpe:2.3:a:libpng:libpng:1.0.7:beta12
  • cpe:2.3:a:libpng:libpng:1.0.7:beta13
    cpe:2.3:a:libpng:libpng:1.0.7:beta13
  • cpe:2.3:a:libpng:libpng:1.0.7:beta14
    cpe:2.3:a:libpng:libpng:1.0.7:beta14
  • cpe:2.3:a:libpng:libpng:1.0.7:beta15
    cpe:2.3:a:libpng:libpng:1.0.7:beta15
  • cpe:2.3:a:libpng:libpng:1.0.7:beta16
    cpe:2.3:a:libpng:libpng:1.0.7:beta16
  • cpe:2.3:a:libpng:libpng:1.0.7:beta17
    cpe:2.3:a:libpng:libpng:1.0.7:beta17
  • cpe:2.3:a:libpng:libpng:1.0.7:beta18
    cpe:2.3:a:libpng:libpng:1.0.7:beta18
  • cpe:2.3:a:libpng:libpng:1.0.7:rc1
    cpe:2.3:a:libpng:libpng:1.0.7:rc1
  • cpe:2.3:a:libpng:libpng:1.0.7:rc2
    cpe:2.3:a:libpng:libpng:1.0.7:rc2
  • cpe:2.3:a:libpng:libpng:1.0.8:beta1
    cpe:2.3:a:libpng:libpng:1.0.8:beta1
  • cpe:2.3:a:libpng:libpng:1.0.8:beta2
    cpe:2.3:a:libpng:libpng:1.0.8:beta2
  • cpe:2.3:a:libpng:libpng:1.0.8:beta3
    cpe:2.3:a:libpng:libpng:1.0.8:beta3
  • cpe:2.3:a:libpng:libpng:1.0.8:beta4
    cpe:2.3:a:libpng:libpng:1.0.8:beta4
  • cpe:2.3:a:libpng:libpng:1.0.8:rc1
    cpe:2.3:a:libpng:libpng:1.0.8:rc1
  • cpe:2.3:a:libpng:libpng:1.0.9:beta1
    cpe:2.3:a:libpng:libpng:1.0.9:beta1
  • cpe:2.3:a:libpng:libpng:1.0.9:beta10
    cpe:2.3:a:libpng:libpng:1.0.9:beta10
  • cpe:2.3:a:libpng:libpng:1.0.9:beta2
    cpe:2.3:a:libpng:libpng:1.0.9:beta2
  • cpe:2.3:a:libpng:libpng:1.0.9:beta3
    cpe:2.3:a:libpng:libpng:1.0.9:beta3
  • cpe:2.3:a:libpng:libpng:1.0.9:beta4
    cpe:2.3:a:libpng:libpng:1.0.9:beta4
  • cpe:2.3:a:libpng:libpng:1.0.9:beta5
    cpe:2.3:a:libpng:libpng:1.0.9:beta5
  • cpe:2.3:a:libpng:libpng:1.0.9:beta6
    cpe:2.3:a:libpng:libpng:1.0.9:beta6
  • cpe:2.3:a:libpng:libpng:1.0.9:beta7
    cpe:2.3:a:libpng:libpng:1.0.9:beta7
  • cpe:2.3:a:libpng:libpng:1.0.9:beta8
    cpe:2.3:a:libpng:libpng:1.0.9:beta8
  • cpe:2.3:a:libpng:libpng:1.0.9:beta9
    cpe:2.3:a:libpng:libpng:1.0.9:beta9
  • cpe:2.3:a:libpng:libpng:1.0.9:rc1
    cpe:2.3:a:libpng:libpng:1.0.9:rc1
  • cpe:2.3:a:libpng:libpng:1.0.9:rc2
    cpe:2.3:a:libpng:libpng:1.0.9:rc2
  • cpe:2.3:a:libpng:libpng:1.0.10:beta1
    cpe:2.3:a:libpng:libpng:1.0.10:beta1
  • cpe:2.3:a:libpng:libpng:1.0.10:rc1
    cpe:2.3:a:libpng:libpng:1.0.10:rc1
  • cpe:2.3:a:libpng:libpng:1.0.11:beta1
    cpe:2.3:a:libpng:libpng:1.0.11:beta1
  • cpe:2.3:a:libpng:libpng:1.0.11:beta2
    cpe:2.3:a:libpng:libpng:1.0.11:beta2
  • cpe:2.3:a:libpng:libpng:1.0.11:beta3
    cpe:2.3:a:libpng:libpng:1.0.11:beta3
  • cpe:2.3:a:libpng:libpng:1.0.11:rc1
    cpe:2.3:a:libpng:libpng:1.0.11:rc1
  • libpng 1.0.12
    cpe:2.3:a:libpng:libpng:1.0.12
  • cpe:2.3:a:libpng:libpng:1.0.12:beta1
    cpe:2.3:a:libpng:libpng:1.0.12:beta1
  • cpe:2.3:a:libpng:libpng:1.0.12:rc1
    cpe:2.3:a:libpng:libpng:1.0.12:rc1
  • libpng 1.0.13
    cpe:2.3:a:libpng:libpng:1.0.13
  • libpng 1.0.14
    cpe:2.3:a:libpng:libpng:1.0.14
  • libpng 1.0.15
    cpe:2.3:a:libpng:libpng:1.0.15
  • cpe:2.3:a:libpng:libpng:1.0.15:rc1
    cpe:2.3:a:libpng:libpng:1.0.15:rc1
  • cpe:2.3:a:libpng:libpng:1.0.15:rc2
    cpe:2.3:a:libpng:libpng:1.0.15:rc2
  • cpe:2.3:a:libpng:libpng:1.0.15:rc3
    cpe:2.3:a:libpng:libpng:1.0.15:rc3
  • libpng 1.0.16
    cpe:2.3:a:libpng:libpng:1.0.16
  • libpng 1.0.17
    cpe:2.3:a:libpng:libpng:1.0.17
  • libpng 1.0.18
    cpe:2.3:a:libpng:libpng:1.0.18
  • libpng 1.0.19
    cpe:2.3:a:libpng:libpng:1.0.19
  • cpe:2.3:a:libpng:libpng:1.0.19:rc1
    cpe:2.3:a:libpng:libpng:1.0.19:rc1
  • cpe:2.3:a:libpng:libpng:1.0.19:rc2
    cpe:2.3:a:libpng:libpng:1.0.19:rc2
  • cpe:2.3:a:libpng:libpng:1.0.19:rc3
    cpe:2.3:a:libpng:libpng:1.0.19:rc3
  • cpe:2.3:a:libpng:libpng:1.0.19:rc5
    cpe:2.3:a:libpng:libpng:1.0.19:rc5
  • libpng 1.0.20
    cpe:2.3:a:libpng:libpng:1.0.20
  • libpng 1.0.21
    cpe:2.3:a:libpng:libpng:1.0.21
  • cpe:2.3:a:libpng:libpng:1.0.21:rc1
    cpe:2.3:a:libpng:libpng:1.0.21:rc1
  • cpe:2.3:a:libpng:libpng:1.0.21:rc2
    cpe:2.3:a:libpng:libpng:1.0.21:rc2
  • libpng 1.0.22
    cpe:2.3:a:libpng:libpng:1.0.22
  • cpe:2.3:a:libpng:libpng:1.0.22:rc1
    cpe:2.3:a:libpng:libpng:1.0.22:rc1
  • libpng 1.0.23
    cpe:2.3:a:libpng:libpng:1.0.23
  • cpe:2.3:a:libpng:libpng:1.0.23:rc1
    cpe:2.3:a:libpng:libpng:1.0.23:rc1
  • cpe:2.3:a:libpng:libpng:1.0.23:rc2
    cpe:2.3:a:libpng:libpng:1.0.23:rc2
  • cpe:2.3:a:libpng:libpng:1.0.23:rc3
    cpe:2.3:a:libpng:libpng:1.0.23:rc3
  • cpe:2.3:a:libpng:libpng:1.0.23:rc4
    cpe:2.3:a:libpng:libpng:1.0.23:rc4
  • cpe:2.3:a:libpng:libpng:1.0.23:rc5
    cpe:2.3:a:libpng:libpng:1.0.23:rc5
  • libpng 1.0.24
    cpe:2.3:a:libpng:libpng:1.0.24
  • cpe:2.3:a:libpng:libpng:1.0.24:rc1
    cpe:2.3:a:libpng:libpng:1.0.24:rc1
  • libpng 1.0.25
    cpe:2.3:a:libpng:libpng:1.0.25
  • cpe:2.3:a:libpng:libpng:1.0.25:rc1
    cpe:2.3:a:libpng:libpng:1.0.25:rc1
  • cpe:2.3:a:libpng:libpng:1.0.25:rc2
    cpe:2.3:a:libpng:libpng:1.0.25:rc2
  • libpng 1.0.26
    cpe:2.3:a:libpng:libpng:1.0.26
  • libpng 1.0.27
    cpe:2.3:a:libpng:libpng:1.0.27
  • cpe:2.3:a:libpng:libpng:1.0.27:rc1
    cpe:2.3:a:libpng:libpng:1.0.27:rc1
  • cpe:2.3:a:libpng:libpng:1.0.27:rc2
    cpe:2.3:a:libpng:libpng:1.0.27:rc2
  • cpe:2.3:a:libpng:libpng:1.0.27:rc3
    cpe:2.3:a:libpng:libpng:1.0.27:rc3
  • cpe:2.3:a:libpng:libpng:1.0.27:rc4
    cpe:2.3:a:libpng:libpng:1.0.27:rc4
  • cpe:2.3:a:libpng:libpng:1.0.27:rc5
    cpe:2.3:a:libpng:libpng:1.0.27:rc5
  • cpe:2.3:a:libpng:libpng:1.0.27:rc6
    cpe:2.3:a:libpng:libpng:1.0.27:rc6
  • libpng 1.0.28
    cpe:2.3:a:libpng:libpng:1.0.28
  • cpe:2.3:a:libpng:libpng:1.0.28:rc2
    cpe:2.3:a:libpng:libpng:1.0.28:rc2
  • cpe:2.3:a:libpng:libpng:1.0.28:rc3
    cpe:2.3:a:libpng:libpng:1.0.28:rc3
  • cpe:2.3:a:libpng:libpng:1.0.28:rc4
    cpe:2.3:a:libpng:libpng:1.0.28:rc4
  • cpe:2.3:a:libpng:libpng:1.0.28:rc5
    cpe:2.3:a:libpng:libpng:1.0.28:rc5
  • cpe:2.3:a:libpng:libpng:1.0.28:rc6
    cpe:2.3:a:libpng:libpng:1.0.28:rc6
  • libpng 1.0.29
    cpe:2.3:a:libpng:libpng:1.0.29
  • cpe:2.3:a:libpng:libpng:1.0.29:beta1
    cpe:2.3:a:libpng:libpng:1.0.29:beta1
  • cpe:2.3:a:libpng:libpng:1.0.29:rc1
    cpe:2.3:a:libpng:libpng:1.0.29:rc1
  • cpe:2.3:a:libpng:libpng:1.0.29:rc2
    cpe:2.3:a:libpng:libpng:1.0.29:rc2
  • cpe:2.3:a:libpng:libpng:1.0.29:rc3
    cpe:2.3:a:libpng:libpng:1.0.29:rc3
  • libpng 1.0.30
    cpe:2.3:a:libpng:libpng:1.0.30
  • cpe:2.3:a:libpng:libpng:1.0.30:rc1
    cpe:2.3:a:libpng:libpng:1.0.30:rc1
  • libpng 1.0.31
    cpe:2.3:a:libpng:libpng:1.0.31
  • cpe:2.3:a:libpng:libpng:1.0.31:rc01
    cpe:2.3:a:libpng:libpng:1.0.31:rc01
  • libpng 1.0.32
    cpe:2.3:a:libpng:libpng:1.0.32
  • cpe:2.3:a:libpng:libpng:1.2.0:beta1
    cpe:2.3:a:libpng:libpng:1.2.0:beta1
  • cpe:2.3:a:libpng:libpng:1.2.0:beta2
    cpe:2.3:a:libpng:libpng:1.2.0:beta2
  • cpe:2.3:a:libpng:libpng:1.2.0:beta3
    cpe:2.3:a:libpng:libpng:1.2.0:beta3
  • cpe:2.3:a:libpng:libpng:1.2.0:beta4
    cpe:2.3:a:libpng:libpng:1.2.0:beta4
  • cpe:2.3:a:libpng:libpng:1.2.0:beta5
    cpe:2.3:a:libpng:libpng:1.2.0:beta5
  • cpe:2.3:a:libpng:libpng:1.2.0:rc1
    cpe:2.3:a:libpng:libpng:1.2.0:rc1
  • cpe:2.3:a:libpng:libpng:1.2.1:beta1
    cpe:2.3:a:libpng:libpng:1.2.1:beta1
  • cpe:2.3:a:libpng:libpng:1.2.1:beta2
    cpe:2.3:a:libpng:libpng:1.2.1:beta2
  • cpe:2.3:a:libpng:libpng:1.2.1:beta3
    cpe:2.3:a:libpng:libpng:1.2.1:beta3
  • cpe:2.3:a:libpng:libpng:1.2.1:beta4
    cpe:2.3:a:libpng:libpng:1.2.1:beta4
  • cpe:2.3:a:libpng:libpng:1.2.1:rc1
    cpe:2.3:a:libpng:libpng:1.2.1:rc1
  • cpe:2.3:a:libpng:libpng:1.2.1:rc2
    cpe:2.3:a:libpng:libpng:1.2.1:rc2
  • cpe:2.3:a:libpng:libpng:1.2.2:beta1
    cpe:2.3:a:libpng:libpng:1.2.2:beta1
  • cpe:2.3:a:libpng:libpng:1.2.2:beta2
    cpe:2.3:a:libpng:libpng:1.2.2:beta2
  • cpe:2.3:a:libpng:libpng:1.2.2:beta3
    cpe:2.3:a:libpng:libpng:1.2.2:beta3
  • cpe:2.3:a:libpng:libpng:1.2.2:beta4
    cpe:2.3:a:libpng:libpng:1.2.2:beta4
  • cpe:2.3:a:libpng:libpng:1.2.2:beta5
    cpe:2.3:a:libpng:libpng:1.2.2:beta5
  • cpe:2.3:a:libpng:libpng:1.2.2:beta6
    cpe:2.3:a:libpng:libpng:1.2.2:beta6
  • cpe:2.3:a:libpng:libpng:1.2.2:rc1
    cpe:2.3:a:libpng:libpng:1.2.2:rc1
  • cpe:2.3:a:libpng:libpng:1.2.3:rc1
    cpe:2.3:a:libpng:libpng:1.2.3:rc1
  • cpe:2.3:a:libpng:libpng:1.2.3:rc2
    cpe:2.3:a:libpng:libpng:1.2.3:rc2
  • cpe:2.3:a:libpng:libpng:1.2.3:rc3
    cpe:2.3:a:libpng:libpng:1.2.3:rc3
  • cpe:2.3:a:libpng:libpng:1.2.3:rc4
    cpe:2.3:a:libpng:libpng:1.2.3:rc4
  • cpe:2.3:a:libpng:libpng:1.2.3:rc5
    cpe:2.3:a:libpng:libpng:1.2.3:rc5
  • cpe:2.3:a:libpng:libpng:1.2.3:rc6
    cpe:2.3:a:libpng:libpng:1.2.3:rc6
  • cpe:2.3:a:libpng:libpng:1.2.4:beta1
    cpe:2.3:a:libpng:libpng:1.2.4:beta1
  • cpe:2.3:a:libpng:libpng:1.2.4:beta2
    cpe:2.3:a:libpng:libpng:1.2.4:beta2
  • cpe:2.3:a:libpng:libpng:1.2.4:beta3
    cpe:2.3:a:libpng:libpng:1.2.4:beta3
  • cpe:2.3:a:libpng:libpng:1.2.4:rc1
    cpe:2.3:a:libpng:libpng:1.2.4:rc1
  • cpe:2.3:a:libpng:libpng:1.2.5:beta1
    cpe:2.3:a:libpng:libpng:1.2.5:beta1
  • cpe:2.3:a:libpng:libpng:1.2.5:beta2
    cpe:2.3:a:libpng:libpng:1.2.5:beta2
  • cpe:2.3:a:libpng:libpng:1.2.5:rc1
    cpe:2.3:a:libpng:libpng:1.2.5:rc1
  • cpe:2.3:a:libpng:libpng:1.2.5:rc2
    cpe:2.3:a:libpng:libpng:1.2.5:rc2
  • cpe:2.3:a:libpng:libpng:1.2.5:rc3
    cpe:2.3:a:libpng:libpng:1.2.5:rc3
  • cpe:2.3:a:libpng:libpng:1.2.6:beta1
    cpe:2.3:a:libpng:libpng:1.2.6:beta1
  • cpe:2.3:a:libpng:libpng:1.2.6:beta2
    cpe:2.3:a:libpng:libpng:1.2.6:beta2
  • cpe:2.3:a:libpng:libpng:1.2.6:beta3
    cpe:2.3:a:libpng:libpng:1.2.6:beta3
  • cpe:2.3:a:libpng:libpng:1.2.6:beta4
    cpe:2.3:a:libpng:libpng:1.2.6:beta4
  • cpe:2.3:a:libpng:libpng:1.2.6:rc1
    cpe:2.3:a:libpng:libpng:1.2.6:rc1
  • cpe:2.3:a:libpng:libpng:1.2.6:rc2
    cpe:2.3:a:libpng:libpng:1.2.6:rc2
  • cpe:2.3:a:libpng:libpng:1.2.6:rc3
    cpe:2.3:a:libpng:libpng:1.2.6:rc3
  • cpe:2.3:a:libpng:libpng:1.2.6:rc4
    cpe:2.3:a:libpng:libpng:1.2.6:rc4
  • cpe:2.3:a:libpng:libpng:1.2.6:rc5
    cpe:2.3:a:libpng:libpng:1.2.6:rc5
  • cpe:2.3:a:libpng:libpng:1.2.7:beta1
    cpe:2.3:a:libpng:libpng:1.2.7:beta1
  • cpe:2.3:a:libpng:libpng:1.2.7:beta2
    cpe:2.3:a:libpng:libpng:1.2.7:beta2
  • cpe:2.3:a:libpng:libpng:1.2.8:beta1
    cpe:2.3:a:libpng:libpng:1.2.8:beta1
  • cpe:2.3:a:libpng:libpng:1.2.8:beta2
    cpe:2.3:a:libpng:libpng:1.2.8:beta2
  • cpe:2.3:a:libpng:libpng:1.2.8:beta3
    cpe:2.3:a:libpng:libpng:1.2.8:beta3
  • cpe:2.3:a:libpng:libpng:1.2.8:beta4
    cpe:2.3:a:libpng:libpng:1.2.8:beta4
  • cpe:2.3:a:libpng:libpng:1.2.8:beta5
    cpe:2.3:a:libpng:libpng:1.2.8:beta5
  • cpe:2.3:a:libpng:libpng:1.2.8:rc1
    cpe:2.3:a:libpng:libpng:1.2.8:rc1
  • cpe:2.3:a:libpng:libpng:1.2.8:rc2
    cpe:2.3:a:libpng:libpng:1.2.8:rc2
  • cpe:2.3:a:libpng:libpng:1.2.8:rc3
    cpe:2.3:a:libpng:libpng:1.2.8:rc3
  • cpe:2.3:a:libpng:libpng:1.2.8:rc4
    cpe:2.3:a:libpng:libpng:1.2.8:rc4
  • cpe:2.3:a:libpng:libpng:1.2.8:rc5
    cpe:2.3:a:libpng:libpng:1.2.8:rc5
  • cpe:2.3:a:libpng:libpng:1.2.9:beta1
    cpe:2.3:a:libpng:libpng:1.2.9:beta1
  • cpe:2.3:a:libpng:libpng:1.2.9:beta10
    cpe:2.3:a:libpng:libpng:1.2.9:beta10
  • cpe:2.3:a:libpng:libpng:1.2.9:beta2
    cpe:2.3:a:libpng:libpng:1.2.9:beta2
  • cpe:2.3:a:libpng:libpng:1.2.9:beta3
    cpe:2.3:a:libpng:libpng:1.2.9:beta3
  • cpe:2.3:a:libpng:libpng:1.2.9:beta4
    cpe:2.3:a:libpng:libpng:1.2.9:beta4
  • cpe:2.3:a:libpng:libpng:1.2.9:beta5
    cpe:2.3:a:libpng:libpng:1.2.9:beta5
  • cpe:2.3:a:libpng:libpng:1.2.9:beta6
    cpe:2.3:a:libpng:libpng:1.2.9:beta6
  • cpe:2.3:a:libpng:libpng:1.2.9:beta7
    cpe:2.3:a:libpng:libpng:1.2.9:beta7
  • cpe:2.3:a:libpng:libpng:1.2.9:beta8
    cpe:2.3:a:libpng:libpng:1.2.9:beta8
  • cpe:2.3:a:libpng:libpng:1.2.9:beta9
    cpe:2.3:a:libpng:libpng:1.2.9:beta9
  • cpe:2.3:a:libpng:libpng:1.2.9:rc1
    cpe:2.3:a:libpng:libpng:1.2.9:rc1
  • cpe:2.3:a:libpng:libpng:1.2.10:beta1
    cpe:2.3:a:libpng:libpng:1.2.10:beta1
  • cpe:2.3:a:libpng:libpng:1.2.10:beta2
    cpe:2.3:a:libpng:libpng:1.2.10:beta2
  • cpe:2.3:a:libpng:libpng:1.2.10:beta3
    cpe:2.3:a:libpng:libpng:1.2.10:beta3
  • cpe:2.3:a:libpng:libpng:1.2.10:beta4
    cpe:2.3:a:libpng:libpng:1.2.10:beta4
  • cpe:2.3:a:libpng:libpng:1.2.10:beta5
    cpe:2.3:a:libpng:libpng:1.2.10:beta5
  • cpe:2.3:a:libpng:libpng:1.2.10:beta6
    cpe:2.3:a:libpng:libpng:1.2.10:beta6
  • cpe:2.3:a:libpng:libpng:1.2.10:beta7
    cpe:2.3:a:libpng:libpng:1.2.10:beta7
  • cpe:2.3:a:libpng:libpng:1.2.10:rc1
    cpe:2.3:a:libpng:libpng:1.2.10:rc1
  • cpe:2.3:a:libpng:libpng:1.2.10:rc2
    cpe:2.3:a:libpng:libpng:1.2.10:rc2
  • cpe:2.3:a:libpng:libpng:1.2.10:rc3
    cpe:2.3:a:libpng:libpng:1.2.10:rc3
  • cpe:2.3:a:libpng:libpng:1.2.11:beta1
    cpe:2.3:a:libpng:libpng:1.2.11:beta1
  • cpe:2.3:a:libpng:libpng:1.2.11:beta2
    cpe:2.3:a:libpng:libpng:1.2.11:beta2
  • cpe:2.3:a:libpng:libpng:1.2.11:beta3
    cpe:2.3:a:libpng:libpng:1.2.11:beta3
  • cpe:2.3:a:libpng:libpng:1.2.11:beta4
    cpe:2.3:a:libpng:libpng:1.2.11:beta4
  • cpe:2.3:a:libpng:libpng:1.2.11:rc1
    cpe:2.3:a:libpng:libpng:1.2.11:rc1
  • cpe:2.3:a:libpng:libpng:1.2.11:rc2
    cpe:2.3:a:libpng:libpng:1.2.11:rc2
  • cpe:2.3:a:libpng:libpng:1.2.11:rc3
    cpe:2.3:a:libpng:libpng:1.2.11:rc3
  • cpe:2.3:a:libpng:libpng:1.2.11:rc5
    cpe:2.3:a:libpng:libpng:1.2.11:rc5
  • cpe:2.3:a:libpng:libpng:1.2.13:beta1
    cpe:2.3:a:libpng:libpng:1.2.13:beta1
  • cpe:2.3:a:libpng:libpng:1.2.13:rc1
    cpe:2.3:a:libpng:libpng:1.2.13:rc1
  • cpe:2.3:a:libpng:libpng:1.2.13:rc2
    cpe:2.3:a:libpng:libpng:1.2.13:rc2
  • cpe:2.3:a:libpng:libpng:1.2.14:beta1
    cpe:2.3:a:libpng:libpng:1.2.14:beta1
  • cpe:2.3:a:libpng:libpng:1.2.14:beta2
    cpe:2.3:a:libpng:libpng:1.2.14:beta2
  • cpe:2.3:a:libpng:libpng:1.2.14:rc1
    cpe:2.3:a:libpng:libpng:1.2.14:rc1
  • cpe:2.3:a:libpng:libpng:1.2.15:beta1
    cpe:2.3:a:libpng:libpng:1.2.15:beta1
  • cpe:2.3:a:libpng:libpng:1.2.15:beta2
    cpe:2.3:a:libpng:libpng:1.2.15:beta2
  • cpe:2.3:a:libpng:libpng:1.2.15:beta3
    cpe:2.3:a:libpng:libpng:1.2.15:beta3
  • cpe:2.3:a:libpng:libpng:1.2.15:beta4
    cpe:2.3:a:libpng:libpng:1.2.15:beta4
  • cpe:2.3:a:libpng:libpng:1.2.15:beta5
    cpe:2.3:a:libpng:libpng:1.2.15:beta5
  • cpe:2.3:a:libpng:libpng:1.2.15:beta6
    cpe:2.3:a:libpng:libpng:1.2.15:beta6
  • cpe:2.3:a:libpng:libpng:1.2.15:rc1
    cpe:2.3:a:libpng:libpng:1.2.15:rc1
  • cpe:2.3:a:libpng:libpng:1.2.15:rc2
    cpe:2.3:a:libpng:libpng:1.2.15:rc2
  • cpe:2.3:a:libpng:libpng:1.2.15:rc3
    cpe:2.3:a:libpng:libpng:1.2.15:rc3
  • cpe:2.3:a:libpng:libpng:1.2.15:rc4
    cpe:2.3:a:libpng:libpng:1.2.15:rc4
  • cpe:2.3:a:libpng:libpng:1.2.15:rc5
    cpe:2.3:a:libpng:libpng:1.2.15:rc5
  • cpe:2.3:a:libpng:libpng:1.2.16:beta1
    cpe:2.3:a:libpng:libpng:1.2.16:beta1
  • cpe:2.3:a:libpng:libpng:1.2.16:beta2
    cpe:2.3:a:libpng:libpng:1.2.16:beta2
  • cpe:2.3:a:libpng:libpng:1.2.16:rc1
    cpe:2.3:a:libpng:libpng:1.2.16:rc1
  • cpe:2.3:a:libpng:libpng:1.2.17:beta1
    cpe:2.3:a:libpng:libpng:1.2.17:beta1
  • cpe:2.3:a:libpng:libpng:1.2.17:beta2
    cpe:2.3:a:libpng:libpng:1.2.17:beta2
  • cpe:2.3:a:libpng:libpng:1.2.17:rc1
    cpe:2.3:a:libpng:libpng:1.2.17:rc1
  • cpe:2.3:a:libpng:libpng:1.2.17:rc2
    cpe:2.3:a:libpng:libpng:1.2.17:rc2
  • cpe:2.3:a:libpng:libpng:1.2.17:rc3
    cpe:2.3:a:libpng:libpng:1.2.17:rc3
  • cpe:2.3:a:libpng:libpng:1.2.17:rc4
    cpe:2.3:a:libpng:libpng:1.2.17:rc4
  • cpe:2.3:a:libpng:libpng:1.2.19:beta1
    cpe:2.3:a:libpng:libpng:1.2.19:beta1
  • cpe:2.3:a:libpng:libpng:1.2.19:beta10
    cpe:2.3:a:libpng:libpng:1.2.19:beta10
  • cpe:2.3:a:libpng:libpng:1.2.19:beta11
    cpe:2.3:a:libpng:libpng:1.2.19:beta11
  • cpe:2.3:a:libpng:libpng:1.2.19:beta12
    cpe:2.3:a:libpng:libpng:1.2.19:beta12
  • cpe:2.3:a:libpng:libpng:1.2.19:beta13
    cpe:2.3:a:libpng:libpng:1.2.19:beta13
  • cpe:2.3:a:libpng:libpng:1.2.19:beta14
    cpe:2.3:a:libpng:libpng:1.2.19:beta14
  • cpe:2.3:a:libpng:libpng:1.2.19:beta15
    cpe:2.3:a:libpng:libpng:1.2.19:beta15
  • cpe:2.3:a:libpng:libpng:1.2.19:beta16
    cpe:2.3:a:libpng:libpng:1.2.19:beta16
  • cpe:2.3:a:libpng:libpng:1.2.19:beta17
    cpe:2.3:a:libpng:libpng:1.2.19:beta17
  • cpe:2.3:a:libpng:libpng:1.2.19:beta18
    cpe:2.3:a:libpng:libpng:1.2.19:beta18
  • cpe:2.3:a:libpng:libpng:1.2.19:beta19
    cpe:2.3:a:libpng:libpng:1.2.19:beta19
  • cpe:2.3:a:libpng:libpng:1.2.19:beta2
    cpe:2.3:a:libpng:libpng:1.2.19:beta2
  • cpe:2.3:a:libpng:libpng:1.2.19:beta20
    cpe:2.3:a:libpng:libpng:1.2.19:beta20
  • cpe:2.3:a:libpng:libpng:1.2.19:beta21
    cpe:2.3:a:libpng:libpng:1.2.19:beta21
  • cpe:2.3:a:libpng:libpng:1.2.19:beta22
    cpe:2.3:a:libpng:libpng:1.2.19:beta22
  • cpe:2.3:a:libpng:libpng:1.2.19:beta23
    cpe:2.3:a:libpng:libpng:1.2.19:beta23
  • cpe:2.3:a:libpng:libpng:1.2.19:beta24
    cpe:2.3:a:libpng:libpng:1.2.19:beta24
  • cpe:2.3:a:libpng:libpng:1.2.19:beta25
    cpe:2.3:a:libpng:libpng:1.2.19:beta25
  • cpe:2.3:a:libpng:libpng:1.2.19:beta26
    cpe:2.3:a:libpng:libpng:1.2.19:beta26
  • cpe:2.3:a:libpng:libpng:1.2.19:beta27
    cpe:2.3:a:libpng:libpng:1.2.19:beta27
  • cpe:2.3:a:libpng:libpng:1.2.19:beta28
    cpe:2.3:a:libpng:libpng:1.2.19:beta28
  • cpe:2.3:a:libpng:libpng:1.2.19:beta29
    cpe:2.3:a:libpng:libpng:1.2.19:beta29
  • cpe:2.3:a:libpng:libpng:1.2.19:beta3
    cpe:2.3:a:libpng:libpng:1.2.19:beta3
  • cpe:2.3:a:libpng:libpng:1.2.19:beta30
    cpe:2.3:a:libpng:libpng:1.2.19:beta30
  • cpe:2.3:a:libpng:libpng:1.2.19:beta31
    cpe:2.3:a:libpng:libpng:1.2.19:beta31
  • cpe:2.3:a:libpng:libpng:1.2.19:beta4
    cpe:2.3:a:libpng:libpng:1.2.19:beta4
  • cpe:2.3:a:libpng:libpng:1.2.19:beta5
    cpe:2.3:a:libpng:libpng:1.2.19:beta5
  • cpe:2.3:a:libpng:libpng:1.2.19:beta6
    cpe:2.3:a:libpng:libpng:1.2.19:beta6
  • cpe:2.3:a:libpng:libpng:1.2.19:beta7
    cpe:2.3:a:libpng:libpng:1.2.19:beta7
  • cpe:2.3:a:libpng:libpng:1.2.19:beta8
    cpe:2.3:a:libpng:libpng:1.2.19:beta8
  • cpe:2.3:a:libpng:libpng:1.2.19:beta9
    cpe:2.3:a:libpng:libpng:1.2.19:beta9
  • cpe:2.3:a:libpng:libpng:1.2.19:rc1
    cpe:2.3:a:libpng:libpng:1.2.19:rc1
  • cpe:2.3:a:libpng:libpng:1.2.19:rc2
    cpe:2.3:a:libpng:libpng:1.2.19:rc2
  • cpe:2.3:a:libpng:libpng:1.2.19:rc3
    cpe:2.3:a:libpng:libpng:1.2.19:rc3
  • cpe:2.3:a:libpng:libpng:1.2.19:rc4
    cpe:2.3:a:libpng:libpng:1.2.19:rc4
  • cpe:2.3:a:libpng:libpng:1.2.19:rc5
    cpe:2.3:a:libpng:libpng:1.2.19:rc5
  • cpe:2.3:a:libpng:libpng:1.2.19:rc6
    cpe:2.3:a:libpng:libpng:1.2.19:rc6
  • cpe:2.3:a:libpng:libpng:1.2.20:beta01
    cpe:2.3:a:libpng:libpng:1.2.20:beta01
  • cpe:2.3:a:libpng:libpng:1.2.20:beta02
    cpe:2.3:a:libpng:libpng:1.2.20:beta02
  • cpe:2.3:a:libpng:libpng:1.2.20:beta03
    cpe:2.3:a:libpng:libpng:1.2.20:beta03
  • cpe:2.3:a:libpng:libpng:1.2.20:beta04
    cpe:2.3:a:libpng:libpng:1.2.20:beta04
  • cpe:2.3:a:libpng:libpng:1.2.20:rc1
    cpe:2.3:a:libpng:libpng:1.2.20:rc1
  • cpe:2.3:a:libpng:libpng:1.2.20:rc2
    cpe:2.3:a:libpng:libpng:1.2.20:rc2
  • cpe:2.3:a:libpng:libpng:1.2.20:rc3
    cpe:2.3:a:libpng:libpng:1.2.20:rc3
  • cpe:2.3:a:libpng:libpng:1.2.20:rc4
    cpe:2.3:a:libpng:libpng:1.2.20:rc4
  • cpe:2.3:a:libpng:libpng:1.2.20:rc5
    cpe:2.3:a:libpng:libpng:1.2.20:rc5
  • cpe:2.3:a:libpng:libpng:1.2.20:rc6
    cpe:2.3:a:libpng:libpng:1.2.20:rc6
  • cpe:2.3:a:libpng:libpng:1.2.21:rc3
    cpe:2.3:a:libpng:libpng:1.2.21:rc3
  • cpe:2.3:a:libpng:libpng:1.2.22:beta1
    cpe:2.3:a:libpng:libpng:1.2.22:beta1
  • cpe:2.3:a:libpng:libpng:1.2.22:beta2
    cpe:2.3:a:libpng:libpng:1.2.22:beta2
  • cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21
    cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21
  • cpe:2.3:a:libpng:libpng:1.2.22:beta3
    cpe:2.3:a:libpng:libpng:1.2.22:beta3
  • cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21
    cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21
  • cpe:2.3:a:libpng:libpng:1.2.22:beta4
    cpe:2.3:a:libpng:libpng:1.2.22:beta4
  • cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21
    cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21
  • cpe:2.3:a:libpng:libpng:1.2.22:rc1
    cpe:2.3:a:libpng:libpng:1.2.22:rc1
  • cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21
    cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21
  • cpe:2.3:a:libpng:libpng:1.2.23:beta01
    cpe:2.3:a:libpng:libpng:1.2.23:beta01
  • cpe:2.3:a:libpng:libpng:1.2.23:beta02
    cpe:2.3:a:libpng:libpng:1.2.23:beta02
  • cpe:2.3:a:libpng:libpng:1.2.23:beta03
    cpe:2.3:a:libpng:libpng:1.2.23:beta03
  • cpe:2.3:a:libpng:libpng:1.2.23:beta04
    cpe:2.3:a:libpng:libpng:1.2.23:beta04
  • cpe:2.3:a:libpng:libpng:1.2.23:beta05
    cpe:2.3:a:libpng:libpng:1.2.23:beta05
  • cpe:2.3:a:libpng:libpng:1.2.23:rc01
    cpe:2.3:a:libpng:libpng:1.2.23:rc01
  • cpe:2.3:a:libpng:libpng:1.2.24:beta01
    cpe:2.3:a:libpng:libpng:1.2.24:beta01
  • cpe:2.3:a:libpng:libpng:1.2.24:beta02
    cpe:2.3:a:libpng:libpng:1.2.24:beta02
  • cpe:2.3:a:libpng:libpng:1.2.24:beta03
    cpe:2.3:a:libpng:libpng:1.2.24:beta03
  • cpe:2.3:a:libpng:libpng:1.2.24:rc01
    cpe:2.3:a:libpng:libpng:1.2.24:rc01
  • cpe:2.3:a:libpng:libpng:1.2.25:beta01
    cpe:2.3:a:libpng:libpng:1.2.25:beta01
  • cpe:2.3:a:libpng:libpng:1.2.25:beta02
    cpe:2.3:a:libpng:libpng:1.2.25:beta02
  • cpe:2.3:a:libpng:libpng:1.2.25:beta03
    cpe:2.3:a:libpng:libpng:1.2.25:beta03
  • cpe:2.3:a:libpng:libpng:1.2.25:beta04
    cpe:2.3:a:libpng:libpng:1.2.25:beta04
  • cpe:2.3:a:libpng:libpng:1.2.25:beta05
    cpe:2.3:a:libpng:libpng:1.2.25:beta05
  • cpe:2.3:a:libpng:libpng:1.2.25:beta06
    cpe:2.3:a:libpng:libpng:1.2.25:beta06
  • cpe:2.3:a:libpng:libpng:1.2.25:rc01
    cpe:2.3:a:libpng:libpng:1.2.25:rc01
  • cpe:2.3:a:libpng:libpng:1.2.25:rc02
    cpe:2.3:a:libpng:libpng:1.2.25:rc02
  • cpe:2.3:a:libpng:libpng:1.2.26:beta01
    cpe:2.3:a:libpng:libpng:1.2.26:beta01
  • cpe:2.3:a:libpng:libpng:1.2.26:beta02
    cpe:2.3:a:libpng:libpng:1.2.26:beta02
  • cpe:2.3:a:libpng:libpng:1.2.26:beta03
    cpe:2.3:a:libpng:libpng:1.2.26:beta03
  • cpe:2.3:a:libpng:libpng:1.2.26:beta04
    cpe:2.3:a:libpng:libpng:1.2.26:beta04
  • cpe:2.3:a:libpng:libpng:1.2.26:beta05
    cpe:2.3:a:libpng:libpng:1.2.26:beta05
  • cpe:2.3:a:libpng:libpng:1.2.26:beta06
    cpe:2.3:a:libpng:libpng:1.2.26:beta06
  • cpe:2.3:a:libpng:libpng:1.2.26:rc01
    cpe:2.3:a:libpng:libpng:1.2.26:rc01
  • cpe:2.3:a:libpng:libpng:1.4:beta1
    cpe:2.3:a:libpng:libpng:1.4:beta1
  • cpe:2.3:a:libpng:libpng:1.4:beta10
    cpe:2.3:a:libpng:libpng:1.4:beta10
  • cpe:2.3:a:libpng:libpng:1.4:beta11
    cpe:2.3:a:libpng:libpng:1.4:beta11
  • cpe:2.3:a:libpng:libpng:1.4:beta12
    cpe:2.3:a:libpng:libpng:1.4:beta12
  • cpe:2.3:a:libpng:libpng:1.4:beta13
    cpe:2.3:a:libpng:libpng:1.4:beta13
  • cpe:2.3:a:libpng:libpng:1.4:beta14
    cpe:2.3:a:libpng:libpng:1.4:beta14
  • cpe:2.3:a:libpng:libpng:1.4:beta15
    cpe:2.3:a:libpng:libpng:1.4:beta15
  • cpe:2.3:a:libpng:libpng:1.4:beta16
    cpe:2.3:a:libpng:libpng:1.4:beta16
  • cpe:2.3:a:libpng:libpng:1.4:beta17
    cpe:2.3:a:libpng:libpng:1.4:beta17
  • cpe:2.3:a:libpng:libpng:1.4:beta18
    cpe:2.3:a:libpng:libpng:1.4:beta18
  • cpe:2.3:a:libpng:libpng:1.4:beta19
    cpe:2.3:a:libpng:libpng:1.4:beta19
  • cpe:2.3:a:libpng:libpng:1.4:beta2
    cpe:2.3:a:libpng:libpng:1.4:beta2
  • cpe:2.3:a:libpng:libpng:1.4:beta3
    cpe:2.3:a:libpng:libpng:1.4:beta3
  • cpe:2.3:a:libpng:libpng:1.4:beta4
    cpe:2.3:a:libpng:libpng:1.4:beta4
  • cpe:2.3:a:libpng:libpng:1.4:beta5
    cpe:2.3:a:libpng:libpng:1.4:beta5
  • cpe:2.3:a:libpng:libpng:1.4:beta6
    cpe:2.3:a:libpng:libpng:1.4:beta6
  • cpe:2.3:a:libpng:libpng:1.4:beta7
    cpe:2.3:a:libpng:libpng:1.4:beta7
  • cpe:2.3:a:libpng:libpng:1.4:beta8
    cpe:2.3:a:libpng:libpng:1.4:beta8
  • cpe:2.3:a:libpng:libpng:1.4:beta9
    cpe:2.3:a:libpng:libpng:1.4:beta9
CVSS
Base: 7.5 (as of 14-04-2008 - 13:26)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family VMware ESX Local Security Checks
    NASL id VMWARE_VMSA-2009-0007.NASL
    description a. VMware Descheduled Time Accounting driver vulnerability may cause a denial of service in Windows based virtual machines. The VMware Descheduled Time Accounting Service is an optional, experimental service that provides improved guest operating system accounting. This patch fixes a denial of service vulnerability that could be triggered in a virtual machine by an unprivileged, locally logged-on user in the virtual machine. Virtual machines are affected under the following conditions : - The virtual machine is running a Windows operating system. - The VMware Descheduled Time Accounting driver is installed in the virtual machine. Note that this is an optional (non- default) part of the VMware Tools installation. - The VMware Descheduled Time Accounting Service is not running in the virtual machine The VMware Descheduled Time Accounting Service is no longer provided in newer versions of VMware Tools, starting with the versions released in Fusion 2.0.2 and ESX 4.0. However, virtual machines migrated from vulnerable releases will still be vulnerable if the three conditions listed above are met, until their tools are upgraded. Steps needed to remediate this vulnerability : Guest systems on VMware Workstation, Player, ACE, Server, Fusion - Install the new version of Workstation, Player, ACE, Server, Fusion (see below for version information) - Upgrade tools in the virtual machine (virtual machine users will be prompted to upgrade). Guest systems on ESX 3.5, ESXi 3.5, ESX 3.0.2, ESX 3.0.3 - Install the relevant patches (see below for patch identifiers) - Manually upgrade tools in the virtual machine (virtual machine users will not be prompted to upgrade). Note the VI Client will not show the VMware tools is out of date in the summary tab. Please see http://tinyurl.com/27mpjo page 80 for details. Guests systems on ESX 4.0 and ESXi 4.0 that have been migrated from ESX 3.5, ESXi 3.5, and ESX 3.0.x - Install/upgrade the new tools in the virtual machine (virtual machine users will be prompted to upgrade). If the Descheduled Time Accounting driver was installed, the tools upgrade will result in an updated driver for Workstation, Player, ACE, Server, ESX 3.0.2, ESX 3.0.3, ESX 3.5, ESXi 3.5. For Fusion, ESX 4.0, and ESXi 4.0 the tools upgrade will result in the removal of the driver. VMware would like to thank Nikita Tarakanov for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2009-1805 to this issue. b. Updated libpng package for the ESX 2.5.5 Service Console The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. A flaw was discovered in the way libpng handled PNG images containing 'unknown' chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-0040 and CVE-2008-1382 to these issues. The VMware version number of libpng after applying the update is libpng-1.0.14-12.i386.rpm.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 40392
    published 2009-07-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40392
    title VMSA-2009-0007 : VMware Hosted products and ESX and ESXi patches resolve security issues
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2009-0333.NASL
    description From Red Hat Security Advisory 2009:0333 : Updated libpng and libpng10 packages that fix a couple of security issues are now available for Red Hat Enterprise Linux 2.1, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) A flaw was discovered in the way libpng handled PNG images containing 'unknown' chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash. (CVE-2008-1382) Users of libpng and libpng10 should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2016-12-07
    plugin id 67815
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67815
    title Oracle Linux 4 / 5 : libpng (ELSA-2009-0333)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200812-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-200812-15 (POV-Ray: User-assisted execution of arbitrary code) POV-Ray uses a statically linked copy of libpng to view and output PNG files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964, CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in POV-Ray's build system caused it to load the old version when your installed copy of libpng was >=media-libs/libpng-1.2.10. Impact : An attacker could entice a user to load a specially crafted PNG file as a texture, resulting in the execution of arbitrary code with the permissions of the user running the application. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 35107
    published 2008-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35107
    title GLSA-200812-15 : POV-Ray: User-assisted execution of arbitrary code
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201412-08.NASL
    description The remote host is affected by the vulnerability described in GLSA-201412-08 (Multiple packages, Multiple vulnerabilities fixed in 2010) Vulnerabilities have been discovered in the packages listed below. Please review the CVE identifiers in the Reference section for details. Insight Perl Tk Module Source-Navigator Tk Partimage Mlmmj acl Xinit gzip ncompress liblzw splashutils GNU M4 KDE Display Manager GTK+ KGet dvipng Beanstalk Policy Mount pam_krb5 GNU gv LFTP Uzbl Slim Bitdefender Console iputils DVBStreamer Impact : A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions. Workaround : There are no known workarounds at this time.
    last seen 2019-02-21
    modified 2018-12-05
    plugin id 79961
    published 2014-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=79961
    title GLSA-201412-08 : Multiple packages, Multiple vulnerabilities fixed in 2010
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2008-006.NASL
    description The remote host is running a version of Mac OS X 10.4 that does not have the security update 2008-006 applied. This update contains security fixes for a number of programs.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 34210
    published 2008-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34210
    title Mac OS X Multiple Vulnerabilities (Security Update 2008-006)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_5_5.NASL
    description The remote host is running a version of Mac OS X 10.5.x that is prior to 10.5.5. Mac OS X 10.5.5 contains security fixes for a number of programs.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 34211
    published 2008-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34211
    title Mac OS X 10.5.x < 10.5.5 Multiple Vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-3979.NASL
    description This update fixes the way that libpng10 handles unknown zero-length chunks, which in previous versions could result in writing to attacker controlled addresses, depending on how the libpng api is used. To be affected, an application would have to call png_set_keep_unknown_chunks(), which tells libpng not to ignore unknown chunks, but to do something with them. The PNG spec allows for 'unknown' chunks, which are ignored by default, but an application could in theory embed some sort of extra data in a png image, then later get it back out via this mechanism. No packages in Fedora are believed to be affected by this issue, but it's possible that third-party applications could be. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 32460
    published 2008-05-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32460
    title Fedora 7 : libpng10-1.0.37-1.fc7 (2008-3979)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20090304_LIBPNG_ON_SL3_X.NASL
    description A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) A flaw was discovered in the way libpng handled PNG images containing 'unknown' chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash. (CVE-2008-1382) All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60539
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60539
    title Scientific Linux Security Update : libpng on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2008-156.NASL
    description Tavis Ormandy of the Google Security Team discovered a flaw in how libpng handles zero-length unknown chunks in PNG files, which could lead to memory corruption in applications that make use of certain functions (CVE-2008-1382). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 38060
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38060
    title Mandriva Linux Security Advisory : libpng (MDVSA-2008:156)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2008-119-01.NASL
    description New libpng packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 32083
    published 2008-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32083
    title Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 8.1 / 9.0 / 9.1 / current : libpng (SSA:2008-119-01)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_137080-09.NASL
    description SunOS 5.10: libpng Patch. Date this patch was last updated by Sun : Jun/15/17
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107484
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107484
    title Solaris 10 (sparc) : 137080-09
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_137081-10.NASL
    description SunOS 5.10_x86: libpng Patch. Date this patch was last updated by Sun : Jul/17/17
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107983
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107983
    title Solaris 10 (x86) : 137081-10
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-3937.NASL
    description This update fixes the way that libpng10 handles unknown zero-length chunks, which in previous versions could result in writing to attacker controlled addresses, depending on how the libpng api is used. To be affected, an application would have to call png_set_keep_unknown_chunks(), which tells libpng not to ignore unknown chunks, but to do something with them. The PNG spec allows for 'unknown' chunks, which are ignored by default, but an application could in theory embed some sort of extra data in a png image, then later get it back out via this mechanism. No packages in Fedora are believed to be affected by this issue, but it's possible that third-party applications could be. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 32459
    published 2008-05-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32459
    title Fedora 8 : libpng10-1.0.37-1.fc8 (2008-3937)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200804-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-200804-15 (libpng: Execution of arbitrary code) Tavis Ormandy of the Google Security Team discovered that libpng does not handle zero-length unknown chunks in PNG files correctly, which might lead to memory corruption in applications that call png_set_read_user_chunk_fn() or png_set_keep_unknown_chunks(). Impact : A remote attacker could entice a user or automated system to process a specially crafted PNG image in an application using libpng and possibly execute arbitrary code with the privileges of the user running the application. Note that processing of unknown chunks is disabled by default in most PNG applications, but some such as ImageMagick are affected. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 31962
    published 2008-04-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31962
    title GLSA-200804-15 : libpng: Execution of arbitrary code
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_5_7.NASL
    description The remote host is running a version of Mac OS X 10.5.x that is prior to 10.5.7. Mac OS X 10.5.7 contains security fixes for the following products : - Apache - ATS - BIND - CFNetwork - CoreGraphics - Cscope - CUPS - Disk Images - enscript - Flash Player plug-in - Help Viewer - iChat - International Components for Unicode - IPSec - Kerberos - Kernel - Launch Services - libxml - Net-SNMP - Network Time - Networking - OpenSSL - PHP - QuickDraw Manager - ruby - Safari - Spotlight - system_cmds - telnet - Terminal - WebKit - X11
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 38744
    published 2009-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=38744
    title Mac OS X 10.5.x < 10.5.7 Multiple Vulnerabilities
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2009-0333.NASL
    description Updated libpng and libpng10 packages that fix a couple of security issues are now available for Red Hat Enterprise Linux 2.1, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) A flaw was discovered in the way libpng handled PNG images containing 'unknown' chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash. (CVE-2008-1382) Users of libpng and libpng10 should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 43731
    published 2010-01-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=43731
    title CentOS 4 : libpng (CESA-2009:0333)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2009-0333.NASL
    description Updated libpng and libpng10 packages that fix a couple of security issues are now available for Red Hat Enterprise Linux 2.1, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) A flaw was discovered in the way libpng handled PNG images containing 'unknown' chunks. If an application linked against libpng attempted to process a malformed, unknown chunk in a malicious PNG image, it could cause the application to crash. (CVE-2008-1382) Users of libpng and libpng10 should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libpng or libpng10 must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-27
    plugin id 35775
    published 2009-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35775
    title RHEL 2.1 / 4 / 5 : libpng (RHSA-2009:0333)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_LIBPNG-DEVEL-080625.NASL
    description Specially crafted png files could overwrite arbitrary memory. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-1382).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40036
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40036
    title openSUSE Security Update : libpng-devel (libpng-devel-66)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-4947.NASL
    description Update to new upstream version 1.2.29. Among other bug fixes, this introduces a minor security fix in the handling of unknown chunks - CVE-2008-1382: http://libpng.sourceforge.net/Advisory-1.2.26.txt http://www.ocert.org/advisories/ocert-2008-003.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-24
    plugin id 33082
    published 2008-06-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=33082
    title Fedora 7 : libpng-1.2.29-1.fc7 (2008-4947)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_137081-09.NASL
    description SunOS 5.10_x86: libpng Patch. Date this patch was last updated by Sun : Jun/15/17
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107982
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107982
    title Solaris 10 (x86) : 137081-09
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_137081-07.NASL
    description SunOS 5.10_x86: libpng Patch. Date this patch was last updated by Sun : Jul/18/12
    last seen 2018-10-31
    modified 2018-10-29
    plugin id 107981
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107981
    title Solaris 10 (x86) : 137081-07
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_137080.NASL
    description SunOS 5.10: libpng Patch. Date this patch was last updated by Sun : Sep/11/17 This plugin has been deprecated and either replaced with individual 137080 patch-revision plugins, or deemed non-security related.
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 31333
    published 2008-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31333
    title Solaris 10 (sparc) : 137080-11 (deprecated)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-730-1.NASL
    description It was discovered that libpng did not properly perform bounds checking in certain operations. An attacker could send a specially crafted PNG image and cause a denial of service in applications linked against libpng. This issue only affected Ubuntu 8.04 LTS. (CVE-2007-5268, CVE-2007-5269) Tavis Ormandy discovered that libpng did not properly initialize memory. If a user or automated system were tricked into opening a crafted PNG image, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue did not affect Ubuntu 8.10. (CVE-2008-1382) Harald van Dijk discovered an off-by-one error in libpng. An attacker could could cause an application crash in programs using pngtest. (CVE-2008-3964) It was discovered that libpng did not properly NULL terminate a keyword string. An attacker could exploit this to set arbitrary memory locations to zero. (CVE-2008-5907) Glenn Randers-Pehrson discovered that libpng did not properly initialize pointers. If a user or automated system were tricked into opening a crafted PNG file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-0040). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 37042
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=37042
    title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : libpng vulnerabilities (USN-730-1)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_137080-07.NASL
    description SunOS 5.10: libpng Patch. Date this patch was last updated by Sun : Jul/18/12
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107483
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107483
    title Solaris 10 (sparc) : 137080-07
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200805-10.NASL
    description The remote host is affected by the vulnerability described in GLSA-200805-10 (Pngcrush: User-assisted execution of arbitrary code) It has been reported that Pngcrush includes a copy of libpng that is vulnerable to a memory corruption (GLSA 200804-15). Impact : A remote attacker could entice a user to process a specially crafted PNG image, possibly resulting in the execution of arbitrary code with the privileges of the user running the application, or a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-11-14
    plugin id 32301
    published 2008-05-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32301
    title GLSA-200805-10 : Pngcrush: User-assisted execution of arbitrary code
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12141.NASL
    description Specially crafted PNG files could overwrite arbitrary memory. Attackers could potentially exploit that to execute arbitrary code. (CVE-2008-1382)
    last seen 2018-09-02
    modified 2012-04-23
    plugin id 41209
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41209
    title SuSE9 Security Update : libpng (YOU Patch Number 12141)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-1750.NASL
    description Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2007-2445 The png_handle_tRNS function allows attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. - CVE-2007-5269 Certain chunk handlers allow attackers to cause a denial of service (crash) via crafted pCAL, sCAL, tEXt, iTXt, and ztXT chunking in PNG images, which trigger out-of-bounds read operations. - CVE-2008-1382 libpng allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length 'unknown' chunks, which trigger an access of uninitialized memory. - CVE-2008-5907 The png_check_keyword might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords. - CVE-2008-6218 A memory leak in the png_handle_tEXt function allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file. - CVE-2009-0040 libpng allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 35988
    published 2009-03-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35988
    title Debian DSA-1750-1 : libpng - several vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-4910.NASL
    description Update to new upstream version 1.2.29. Among other bug fixes, this introduces a minor security fix in the handling of unknown chunks - CVE-2008-1382: http://libpng.sourceforge.net/Advisory-1.2.26.txt http://www.ocert.org/advisories/ocert-2008-003.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-24
    plugin id 33081
    published 2008-06-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=33081
    title Fedora 9 : libpng-1.2.29-1.fc9 (2008-4910)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-3683.NASL
    description This update fixes the way that libpng10 handles unknown zero-length chunks, which in previous versions could result in writing to attacker controlled addresses, depending on how the libpng api is used. To be affected, an application would have to call png_set_keep_unknown_chunks(), which tells libpng not to ignore unknown chunks, but to do something with them. The PNG spec allows for 'unknown' chunks, which are ignored by default, but an application could in theory embed some sort of extra data in a png image, then later get it back out via this mechanism. No packages in Fedora are believed to be affected by this issue, but it's possible that third-party applications could be. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-21
    plugin id 32458
    published 2008-05-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32458
    title Fedora 9 : libpng10-1.0.37-1.fc9 (2008-3683)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_137080-10.NASL
    description SunOS 5.10: libpng Patch. Date this patch was last updated by Sun : Jul/17/17
    last seen 2018-10-27
    modified 2018-10-26
    plugin id 107485
    published 2018-03-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107485
    title Solaris 10 (sparc) : 137080-10
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBPNG-5181.NASL
    description Specially crafted png files could overwrite arbitrary memory. Attackers could potentially exploit that to execute arbitrary code. (CVE-2008-1382)
    last seen 2018-09-01
    modified 2012-05-17
    plugin id 32052
    published 2008-04-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32052
    title SuSE 10 Security Update : libpng (ZYPP Patch Number 5181)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBPNG-5180.NASL
    description Specially crafted png files could overwrite arbitrary memory. Attackers could potentially exploit that to execute arbitrary code (CVE-2008-1382).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 32024
    published 2008-04-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32024
    title openSUSE 10 Security Update : libpng (libpng-5180)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2008-4847.NASL
    description Update to new upstream version 1.2.29. Among other bug fixes, this introduces a minor security fix in the handling of unknown chunks - CVE-2008-1382: http://libpng.sourceforge.net/Advisory-1.2.26.txt http://www.ocert.org/advisories/ocert-2008-003.html Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-24
    plugin id 33079
    published 2008-06-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=33079
    title Fedora 8 : libpng-1.2.29-1.fc8 (2008-4847)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_57C705D612AE11DDBAB70016179B2DD5.NASL
    description Secunia reports : Tavis Ormandy has reported a vulnerability in libpng, which can be exploited by malicious people to cause a Denial of Service, disclose potentially sensitive information, or potentially compromise an application using the library. The vulnerability is caused due to the improper handling of PNG chunks unknown to the library. This can be exploited to trigger the use of uninitialized memory in e.g. a free() call via unknown PNG chunks having a length of zero. Successful exploitation may allow execution of arbitrary code, but requires that the application calls the png_set_read_user_chunk_fn() function or the png_set_keep_unknown_chunks() function under specific conditions.
    last seen 2019-02-21
    modified 2018-12-19
    plugin id 32110
    published 2008-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=32110
    title FreeBSD : png -- unknown chunk processing uninitialized memory access (57c705d6-12ae-11dd-bab7-0016179b2dd5)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS10_X86_137081.NASL
    description SunOS 5.10_x86: libpng Patch. Date this patch was last updated by Sun : Sep/11/17 This plugin has been deprecated and either replaced with individual 137081 patch-revision plugins, or deemed non-security related.
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 31337
    published 2008-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31337
    title Solaris 10 (x86) : 137081-11 (deprecated)
oval via4
  • accepted 2013-04-29T04:04:40.938-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
    family unix
    id oval:org.mitre.oval:def:10326
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
    version 25
  • accepted 2009-11-09T04:00:44.197-05:00
    class vulnerability
    contributors
    name Michael Wood
    organization Hewlett-Packard
    definition_extensions
    • comment VMWare ESX Server 3.0.3 is installed
      oval oval:org.mitre.oval:def:6026
    • comment VMWare ESX Server 3.0.2 is installed
      oval oval:org.mitre.oval:def:5613
    • comment VMware ESX Server 3.5.0 is installed
      oval oval:org.mitre.oval:def:5887
    description libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
    family unix
    id oval:org.mitre.oval:def:6275
    status accepted
    submitted 2009-09-23T15:39:02.000-04:00
    title mimeTeX and mathTeX Buffer Overflow and Command Injection Issues
    version 3
redhat via4
advisories
rhsa
id RHSA-2009:0333
rpms
  • libpng-2:1.2.7-3.el4_7.2
  • libpng-devel-2:1.2.7-3.el4_7.2
  • libpng10-0:1.0.16-3.el4_7.3
  • libpng10-devel-0:1.0.16-3.el4_7.3
  • libpng-2:1.2.10-7.1.el5_3.2
  • libpng-devel-2:1.2.10-7.1.el5_3.2
refmap via4
apple
  • APPLE-SA-2008-09-15
  • APPLE-SA-2009-05-12
bid 28770
bugtraq
  • 20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling
  • 20080429 rPSA-2008-0151-1 libpng
  • 20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues
cert
  • TA08-260A
  • TA09-133A
confirm
debian DSA-1750
fedora
  • FEDORA-2008-3683
  • FEDORA-2008-3937
  • FEDORA-2008-3979
  • FEDORA-2008-4847
  • FEDORA-2008-4910
  • FEDORA-2008-4947
gentoo
  • GLSA-200804-15
  • GLSA-200805-10
  • GLSA-200812-15
mandriva MDVSA-2008:156
misc http://www.ocert.org/advisories/ocert-2008-003.html
osvdb 44364
sectrack 1019840
secunia
  • 29678
  • 29792
  • 29957
  • 29992
  • 30009
  • 30157
  • 30174
  • 30402
  • 30486
  • 31882
  • 33137
  • 34152
  • 34388
  • 35074
  • 35258
  • 35302
  • 35386
slackware SSA:2008-119-01
sunalert
  • 1020521
  • 259989
suse SUSE-SR:2008:010
vupen
  • ADV-2008-1225
  • ADV-2008-2584
  • ADV-2009-1297
  • ADV-2009-1451
  • ADV-2009-1462
  • ADV-2009-1560
xf libpng-zero-length-code-execution(41800)
statements via4
contributor Joshua Bressers
lastmodified 2009-03-04
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1382 This issue does not affect the version of libpng as shipped with Red Hat Enterprise Linux 3. Updates for affected versions of Red Hat Enterprise Linux can be found here: http://rhn.redhat.com/errata/RHSA-2009-0333.html
Last major update 07-03-2011 - 22:07
Published 14-04-2008 - 12:05
Last modified 11-10-2018 - 16:32
Back to Top