ID CVE-2015-8540
Summary Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
References
Vulnerable Configurations
  • Red Hat Enterprise Linux Desktop Supplementary 5.0
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0
  • Red Hat Enterprise Linux Desktop Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0
  • RedHat Enterprise Linux HPC Node 6.0
    cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0
  • Red Hat Enterprise Linux Server Supplementary 5.0
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0
  • Red Hat Enterprise Linux Server Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0
  • Red Hat Enterprise Linux Workstation Supplementary 6.0 (v. 6)
    cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0
  • libpng 1.2.0
    cpe:2.3:a:libpng:libpng:1.2.0
  • libpng 1.2.1
    cpe:2.3:a:libpng:libpng:1.2.1
  • libpng 1.2.2
    cpe:2.3:a:libpng:libpng:1.2.2
  • libpng 1.2.3
    cpe:2.3:a:libpng:libpng:1.2.3
  • libpng 1.2.4
    cpe:2.3:a:libpng:libpng:1.2.4
  • libpng 1.2.5
    cpe:2.3:a:libpng:libpng:1.2.5
  • libpng 1.2.6
    cpe:2.3:a:libpng:libpng:1.2.6
  • libpng 1.2.7
    cpe:2.3:a:libpng:libpng:1.2.7
  • libpng 1.2.8
    cpe:2.3:a:libpng:libpng:1.2.8
  • libpng 1.2.9
    cpe:2.3:a:libpng:libpng:1.2.9
  • libpng 1.2.10
    cpe:2.3:a:libpng:libpng:1.2.10
  • libpng 1.2.11
    cpe:2.3:a:libpng:libpng:1.2.11
  • libpng 1.2.12
    cpe:2.3:a:libpng:libpng:1.2.12
  • libpng 1.2.13
    cpe:2.3:a:libpng:libpng:1.2.13
  • libpng 1.2.14
    cpe:2.3:a:libpng:libpng:1.2.14
  • libpng 1.2.15
    cpe:2.3:a:libpng:libpng:1.2.15
  • libpng 1.2.16
    cpe:2.3:a:libpng:libpng:1.2.16
  • libpng 1.2.17
    cpe:2.3:a:libpng:libpng:1.2.17
  • libpng 1.2.18
    cpe:2.3:a:libpng:libpng:1.2.18
  • libpng 1.2.19
    cpe:2.3:a:libpng:libpng:1.2.19
  • libpng 1.2.20
    cpe:2.3:a:libpng:libpng:1.2.20
  • libpng 1.2.21
    cpe:2.3:a:libpng:libpng:1.2.21
  • libpng 1.2.22
    cpe:2.3:a:libpng:libpng:1.2.22
  • libpng 1.2.23
    cpe:2.3:a:libpng:libpng:1.2.23
  • libpng 1.2.24
    cpe:2.3:a:libpng:libpng:1.2.24
  • libpng 1.2.25
    cpe:2.3:a:libpng:libpng:1.2.25
  • libpng 1.2.26
    cpe:2.3:a:libpng:libpng:1.2.26
  • libpng 1.2.27
    cpe:2.3:a:libpng:libpng:1.2.27
  • libpng 1.2.28
    cpe:2.3:a:libpng:libpng:1.2.28
  • libpng 1.2.29
    cpe:2.3:a:libpng:libpng:1.2.29
  • libpng 1.2.30
    cpe:2.3:a:libpng:libpng:1.2.30
  • libpng 1.2.31
    cpe:2.3:a:libpng:libpng:1.2.31
  • libpng 1.2.32
    cpe:2.3:a:libpng:libpng:1.2.32
  • libpng 1.2.33
    cpe:2.3:a:libpng:libpng:1.2.33
  • libpng 1.2.34
    cpe:2.3:a:libpng:libpng:1.2.34
  • libpng 1.2.35
    cpe:2.3:a:libpng:libpng:1.2.35
  • libpng 1.2.36
    cpe:2.3:a:libpng:libpng:1.2.36
  • libpng 1.2.37
    cpe:2.3:a:libpng:libpng:1.2.37
  • libpng 1.2.38
    cpe:2.3:a:libpng:libpng:1.2.38
  • libpng 1.2.39
    cpe:2.3:a:libpng:libpng:1.2.39
  • libpng 1.2.40
    cpe:2.3:a:libpng:libpng:1.2.40
  • libpng 1.2.41
    cpe:2.3:a:libpng:libpng:1.2.41
  • libpng 1.2.42
    cpe:2.3:a:libpng:libpng:1.2.42
  • libpng 1.2.43
    cpe:2.3:a:libpng:libpng:1.2.43
  • libpng 1.2.43 devel
    cpe:2.3:a:libpng:libpng:1.2.43:devel
  • libpng 1.2.44
    cpe:2.3:a:libpng:libpng:1.2.44
  • libpng 1.2.45
    cpe:2.3:a:libpng:libpng:1.2.45
  • libpng 1.2.45 devel
    cpe:2.3:a:libpng:libpng:1.2.45:devel
  • libpng 1.2.46
    cpe:2.3:a:libpng:libpng:1.2.46
  • libpng 1.2.46 devel
    cpe:2.3:a:libpng:libpng:1.2.46:devel
  • libpng 1.2.47
    cpe:2.3:a:libpng:libpng:1.2.47
  • libpng 1.2.47 beta
    cpe:2.3:a:libpng:libpng:1.2.47:beta
  • libpng 1.2.48
    cpe:2.3:a:libpng:libpng:1.2.48
  • libpng 1.2.48 betas
    cpe:2.3:a:libpng:libpng:1.2.48:betas
  • Libpng Libpng 1.2.49
    cpe:2.3:a:libpng:libpng:1.2.49
  • Libpng Libpng 1.2.50
    cpe:2.3:a:libpng:libpng:1.2.50
  • Libpng Libpng 1.2.51
    cpe:2.3:a:libpng:libpng:1.2.51
  • Libpng Libpng 1.2.52
    cpe:2.3:a:libpng:libpng:1.2.52
  • Libpng Libpng 1.2.53
    cpe:2.3:a:libpng:libpng:1.2.53
  • Libpng Libpng 1.2.54
    cpe:2.3:a:libpng:libpng:1.2.54
  • libpng 1.2.55
    cpe:2.3:a:libpng:libpng:1.2.55
  • libpng 1.1.1
    cpe:2.3:a:libpng:libpng:1.1.1
  • libpng 1.0.0
    cpe:2.3:a:libpng:libpng:1.0.0
  • libpng 1.0.1
    cpe:2.3:a:libpng:libpng:1.0.1
  • libpng 1.0.2
    cpe:2.3:a:libpng:libpng:1.0.2
  • libpng 1.0.3
    cpe:2.3:a:libpng:libpng:1.0.3
  • libpng 1.0.5
    cpe:2.3:a:libpng:libpng:1.0.5
  • libpng 1.0.6
    cpe:2.3:a:libpng:libpng:1.0.6
  • libpng 1.0.7
    cpe:2.3:a:libpng:libpng:1.0.7
  • libpng 1.0.8
    cpe:2.3:a:libpng:libpng:1.0.8
  • libpng 1.0.9
    cpe:2.3:a:libpng:libpng:1.0.9
  • libpng 1.0.10
    cpe:2.3:a:libpng:libpng:1.0.10
  • libpng 1.0.11
    cpe:2.3:a:libpng:libpng:1.0.11
  • libpng 1.0.12
    cpe:2.3:a:libpng:libpng:1.0.12
  • libpng 1.0.13
    cpe:2.3:a:libpng:libpng:1.0.13
  • libpng 1.0.14
    cpe:2.3:a:libpng:libpng:1.0.14
  • libpng 1.0.15
    cpe:2.3:a:libpng:libpng:1.0.15
  • libpng 1.0.16
    cpe:2.3:a:libpng:libpng:1.0.16
  • libpng 1.0.17
    cpe:2.3:a:libpng:libpng:1.0.17
  • libpng 1.0.18
    cpe:2.3:a:libpng:libpng:1.0.18
  • libpng 1.0.19
    cpe:2.3:a:libpng:libpng:1.0.19
  • libpng 1.0.20
    cpe:2.3:a:libpng:libpng:1.0.20
  • libpng 1.0.21
    cpe:2.3:a:libpng:libpng:1.0.21
  • libpng 1.0.22
    cpe:2.3:a:libpng:libpng:1.0.22
  • libpng 1.0.23
    cpe:2.3:a:libpng:libpng:1.0.23
  • libpng 1.0.24
    cpe:2.3:a:libpng:libpng:1.0.24
  • libpng 1.0.25
    cpe:2.3:a:libpng:libpng:1.0.25
  • libpng 1.0.26
    cpe:2.3:a:libpng:libpng:1.0.26
  • libpng 1.0.27
    cpe:2.3:a:libpng:libpng:1.0.27
  • libpng 1.0.28
    cpe:2.3:a:libpng:libpng:1.0.28
  • libpng 1.0.29
    cpe:2.3:a:libpng:libpng:1.0.29
  • libpng 1.0.30
    cpe:2.3:a:libpng:libpng:1.0.30
  • libpng 1.0.31
    cpe:2.3:a:libpng:libpng:1.0.31
  • libpng 1.0.32
    cpe:2.3:a:libpng:libpng:1.0.32
  • libpng 1.0.33
    cpe:2.3:a:libpng:libpng:1.0.33
  • libpng 1.0.34
    cpe:2.3:a:libpng:libpng:1.0.34
  • libpng 1.0.35
    cpe:2.3:a:libpng:libpng:1.0.35
  • libpng 1.0.37
    cpe:2.3:a:libpng:libpng:1.0.37
  • libpng 1.0.38
    cpe:2.3:a:libpng:libpng:1.0.38
  • libpng 1.0.39
    cpe:2.3:a:libpng:libpng:1.0.39
  • libpng 1.0.40
    cpe:2.3:a:libpng:libpng:1.0.40
  • libpng 1.0.41
    cpe:2.3:a:libpng:libpng:1.0.41
  • libpng 1.0.42
    cpe:2.3:a:libpng:libpng:1.0.42
  • libpng 1.0.43
    cpe:2.3:a:libpng:libpng:1.0.43
  • libpng 1.0.44
    cpe:2.3:a:libpng:libpng:1.0.44
  • libpng 1.0.45
    cpe:2.3:a:libpng:libpng:1.0.45
  • libpng 1.0.46
    cpe:2.3:a:libpng:libpng:1.0.46
  • libpng 1.0.47
    cpe:2.3:a:libpng:libpng:1.0.47
  • libpng 1.0.48
    cpe:2.3:a:libpng:libpng:1.0.48
  • libpng 1.0.50
    cpe:2.3:a:libpng:libpng:1.0.50
  • libpng 1.0.51
    cpe:2.3:a:libpng:libpng:1.0.51
  • libpng 1.0.52
    cpe:2.3:a:libpng:libpng:1.0.52
  • libpng 1.0.53
    cpe:2.3:a:libpng:libpng:1.0.53
  • libpng 1.0.54
    cpe:2.3:a:libpng:libpng:1.0.54
  • libpng 1.0.55
    cpe:2.3:a:libpng:libpng:1.0.55
  • libpng 1.0.55 release candidate 01
    cpe:2.3:a:libpng:libpng:1.0.55:rc01
  • libpng 1.0.56
    cpe:2.3:a:libpng:libpng:1.0.56
  • libpng 1.0.56 devel
    cpe:2.3:a:libpng:libpng:1.0.56:devel
  • libpng 1.0.57
    cpe:2.3:a:libpng:libpng:1.0.57
  • libpng 1.0.57 release candidate 01
    cpe:2.3:a:libpng:libpng:1.0.57:rc01
  • libpng 1.0.58
    cpe:2.3:a:libpng:libpng:1.0.58
  • libpng 1.0.59
    cpe:2.3:a:libpng:libpng:1.0.59
  • libpng 1.0.60
    cpe:2.3:a:libpng:libpng:1.0.60
  • libpng 1.0.61
    cpe:2.3:a:libpng:libpng:1.0.61
  • libpng 1.0.62
    cpe:2.3:a:libpng:libpng:1.0.62
  • libpng 1.0.63
    cpe:2.3:a:libpng:libpng:1.0.63
  • Libpng Libpng 1.0.64
    cpe:2.3:a:libpng:libpng:1.0.64
  • libpng 1.0.65
    cpe:2.3:a:libpng:libpng:1.0.65
  • Fedora Project Fedora 23
    cpe:2.3:o:fedoraproject:fedora:23
  • Debian GNU/Linux 6.0
    cpe:2.3:o:debian:debian_linux:6.0
  • libpng 1.4.0
    cpe:2.3:a:libpng:libpng:1.4.0
  • libpng 1.4.1
    cpe:2.3:a:libpng:libpng:1.4.1
  • libpng 1.4.2
    cpe:2.3:a:libpng:libpng:1.4.2
  • libpng 1.4.3
    cpe:2.3:a:libpng:libpng:1.4.3
  • libpng 1.4.4
    cpe:2.3:a:libpng:libpng:1.4.4
  • libpng 1.4.5
    cpe:2.3:a:libpng:libpng:1.4.5
  • libpng 1.4.6
    cpe:2.3:a:libpng:libpng:1.4.6
  • libpng 1.4.7
    cpe:2.3:a:libpng:libpng:1.4.7
  • libpng 1.4.8
    cpe:2.3:a:libpng:libpng:1.4.8
  • libpng 1.4.9
    cpe:2.3:a:libpng:libpng:1.4.9
  • libpng 1.4.10
    cpe:2.3:a:libpng:libpng:1.4.10
  • Libpng Libpng 1.4.11
    cpe:2.3:a:libpng:libpng:1.4.11
  • Libpng Libpng 1.4.12
    cpe:2.3:a:libpng:libpng:1.4.12
  • Libpng Libpng 1.4.13
    cpe:2.3:a:libpng:libpng:1.4.13
  • Libpng Libpng 1.4.14
    cpe:2.3:a:libpng:libpng:1.4.14
  • Libpng Libpng 1.4.15
    cpe:2.3:a:libpng:libpng:1.4.15
  • Libpng Libpng 1.4.16
    cpe:2.3:a:libpng:libpng:1.4.16
  • Libpng Libpng 1.4.17
    cpe:2.3:a:libpng:libpng:1.4.17
  • libpng 1.4.18
    cpe:2.3:a:libpng:libpng:1.4.18
  • libpng 0.90
    cpe:2.3:a:libpng:libpng:0.90
  • libpng 0.95
    cpe:2.3:a:libpng:libpng:0.95
  • libpng 0.96
    cpe:2.3:a:libpng:libpng:0.96
  • libpng 0.97
    cpe:2.3:a:libpng:libpng:0.97
  • libpng 0.98
    cpe:2.3:a:libpng:libpng:0.98
  • libpng 0.99
    cpe:2.3:a:libpng:libpng:0.99
  • libpng 1.5.0 beta
    cpe:2.3:a:libpng:libpng:1.5.0:beta
  • libpng 1.5.1
    cpe:2.3:a:libpng:libpng:1.5.1
  • libpng 1.5.1 beta
    cpe:2.3:a:libpng:libpng:1.5.1:beta
  • libpng 1.5.2
    cpe:2.3:a:libpng:libpng:1.5.2
  • libpng 1.5.2 beta
    cpe:2.3:a:libpng:libpng:1.5.2:beta
  • libpng 1.5.3 beta
    cpe:2.3:a:libpng:libpng:1.5.3:beta
  • libpng 1.5.4
    cpe:2.3:a:libpng:libpng:1.5.4
  • libpng 1.5.4 beta
    cpe:2.3:a:libpng:libpng:1.5.4:beta
  • libpng 1.5.5
    cpe:2.3:a:libpng:libpng:1.5.5
  • libpng 1.5.5 beta
    cpe:2.3:a:libpng:libpng:1.5.5:beta
  • libpng 1.5.6
    cpe:2.3:a:libpng:libpng:1.5.6
  • libpng 1.5.6 beta
    cpe:2.3:a:libpng:libpng:1.5.6:beta
  • libpng 1.5.7
    cpe:2.3:a:libpng:libpng:1.5.7
  • libpng 1.5.7 beta
    cpe:2.3:a:libpng:libpng:1.5.7:beta
  • libpng 1.5.8
    cpe:2.3:a:libpng:libpng:1.5.8
  • libpng 1.5.8 beta
    cpe:2.3:a:libpng:libpng:1.5.8:beta
  • libpng 1.5.9
    cpe:2.3:a:libpng:libpng:1.5.9
  • libpng 1.5.9 beta
    cpe:2.3:a:libpng:libpng:1.5.9:beta
  • libpng 1.5.10 beta
    cpe:2.3:a:libpng:libpng:1.5.10:beta
  • libpng 1.5.11
    cpe:2.3:a:libpng:libpng:1.5.11
  • libpng 1.5.11 beta
    cpe:2.3:a:libpng:libpng:1.5.11:beta
  • libpng 1.5.12
    cpe:2.3:a:libpng:libpng:1.5.12
  • libpng 1.5.13
    cpe:2.3:a:libpng:libpng:1.5.13
  • libpng 1.5.13 beta
    cpe:2.3:a:libpng:libpng:1.5.13:beta
  • Libpng Libpng 1.5.14
    cpe:2.3:a:libpng:libpng:1.5.14
  • Libpng Libpng 1.5.15
    cpe:2.3:a:libpng:libpng:1.5.15
  • Libpng Libpng 1.5.16
    cpe:2.3:a:libpng:libpng:1.5.16
  • Libpng Libpng 1.5.17
    cpe:2.3:a:libpng:libpng:1.5.17
  • Libpng Libpng 1.5.18
    cpe:2.3:a:libpng:libpng:1.5.18
  • Libpng Libpng 1.5.19
    cpe:2.3:a:libpng:libpng:1.5.19
  • libpng libpng 1.5.20 beta
    cpe:2.3:a:libpng:libpng:1.5.20:beta
  • Libpng Libpng 1.5.21
    cpe:2.3:a:libpng:libpng:1.5.21
  • Libpng Libpng 1.5.22
    cpe:2.3:a:libpng:libpng:1.5.22
  • Libpng Libpng 1.5.23
    cpe:2.3:a:libpng:libpng:1.5.23
  • Libpng Libpng 1.5.24
    cpe:2.3:a:libpng:libpng:1.5.24
  • libpng 1.5.25
    cpe:2.3:a:libpng:libpng:1.5.25
  • libpng 1.3.0
    cpe:2.3:a:libpng:libpng:1.3.0
CVSS
Base: 9.3 (as of 18-04-2016 - 14:53)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-0A543024BF.NASL
    description An underflow read was found in png_check_keyword in libpng10. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-10-18
    plugin id 89137
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89137
    title Fedora 22 : libpng10-1.0.66-1.fc22 (2015-0a543024bf)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-1243.NASL
    description This update for libpng12 fixes the following issues : - CVE-2015-8540: read underflow in libpng (bsc#958791).
    last seen 2018-09-01
    modified 2016-10-31
    plugin id 94426
    published 2016-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94426
    title openSUSE Security Update : libpng12 (openSUSE-2016-1243)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-1430.NASL
    description An update for java-1.7.0-ibm and java-1.7.1-ibm is now available for Red Hat Satellite 5.7 and Red Hat Satellite 5.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to versions 7 SR9-FP40 and 7R1 SR3-FP40. Security Fix(es) : * This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4871, CVE-2015-4872, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4902, CVE-2015-4903, CVE-2015-5006, CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0264, CVE-2016-0363, CVE-2016-0376, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494, CVE-2016-0686, CVE-2016-0687, CVE-2016-3422, CVE-2016-3426, CVE-2016-3427, CVE-2016-3443, CVE-2016-3449) Red Hat would like to thank Andrea Palazzo of Truel IT for reporting the CVE-2015-4806 issue.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 92400
    published 2016-07-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=92400
    title RHEL 5 / 6 : java-1.7.0-ibm and java-1.7.1-ibm (RHSA-2016:1430) (SLOTH)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-375-1.NASL
    description The remote Debian host is running a version of libpng prior to 1.2.44-1+squeeze6. It is, therefore, affected by the following vulnerabilities : - An out-of-bounds read error exists in the png_push_read_zTXt() function within file pngpread.c when decompressing PNG images. An unauthenticated, remote attacker can exploit this, via a large 'avail_in' field to cause a denial of service condition. (CVE-2012-3425) - A buffer overflow condition exists in the png_set_PLTE() function within file pngset.c and the png_get_PLTE() function within file pngget.c when handling bit-depth values less than 8. An unauthenticated, remote attacker can exploit this, via a specially crafted IHDR chunk in a PNG image, to cause a denial of service or have other unspecified impact. (CVE-2015-8472) - An integer underflow condition exists in the png_check_keyword() function within file pngwutil.c. An unauthenticated, remote attacker can exploit this, via a specially crafted PNG image using a space character as a keyword, to cause a denial of service condition or other unspecified impact. (CVE-2015-8540)
    last seen 2019-02-21
    modified 2018-07-09
    plugin id 92678
    published 2016-08-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=92678
    title Debian DLA-375-1 : libpng Security Update
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201611-08.NASL
    description The remote host is affected by the vulnerability described in GLSA-201611-08 (libpng: Multiple vulnerabilities) Multiple vulnerabilities were found in libpng. Please review the referenced CVE’s for additional information. Impact : Remote attackers could cause a Denial of Service condition or have other unspecified impacts. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2017-01-13
    plugin id 94892
    published 2016-11-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94892
    title GLSA-201611-08 : libpng: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0636-1.NASL
    description This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937) : - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed : - bsc#960402: resolve package conflicts in devel package Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 89657
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89657
    title SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2016:0636-1) (SLOTH)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0428-1.NASL
    description This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937) - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed : - bsc#960402: resolve package conflicts in devel package - bsc#960286: resolve package conflicts in the fonts subpackage Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 119974
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119974
    title SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2016:0428-1) (SLOTH)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2015-351-02.NASL
    description New libpng packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2016-10-19
    plugin id 87478
    published 2015-12-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87478
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : libpng (SSA:2015-351-02)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-2861-1.NASL
    description It was discovered that libpng incorrectly handled certain small bit-depth values. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2015-8472) Qixue Xiao and Chen Yu discovered that libpng incorrectly handled certain malformed images. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. (CVE-2015-8540). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 87774
    published 2016-01-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87774
    title Ubuntu 12.04 LTS / 14.04 LTS / 15.04 / 15.10 : libpng vulnerabilities (USN-2861-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-3868CFA17B.NASL
    description An underflow read was found in png_check_keyword in libpng10. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-10-18
    plugin id 89211
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89211
    title Fedora 23 : libpng10-1.0.66-1.fc23 (2015-3868cfa17b)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0770-1.NASL
    description This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937) - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed : - bsc#960402: resolve package conflicts in devel package - bsc#960286: resolve package conflicts in the fonts subpackage Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 89961
    published 2016-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89961
    title SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2016:0770-1) (SLOTH)
  • NASL family AIX Local Security Checks
    NASL id AIX_JAVA_JAN2016_ADVISORY.NASL
    description The version of Java SDK installed on the remote AIX host is affected by multiple vulnerabilities in the following components : - 2D - AWT - IBM J9 JVM - JAXP - JMX - Libraries - Networking - Security
    last seen 2019-02-21
    modified 2018-07-17
    plugin id 89053
    published 2016-03-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89053
    title AIX Java Advisory : java_jan2016_advisory.asc (January 2016 CPU) (SLOTH)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-441.NASL
    description This update for libpng12 fixes the following issues : Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2017-04-06
    plugin id 99211
    published 2017-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99211
    title openSUSE Security Update : libpng12 (openSUSE-2017-441)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0860-1.NASL
    description This update for libpng12 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99088
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99088
    title SUSE SLED12 / SLES12 Security Update : libpng12 (SUSE-SU-2017:0860-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0950-1.NASL
    description This update for libpng15 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99243
    published 2017-04-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99243
    title SUSE SLED12 / SLES12 Security Update : libpng15 (SUSE-SU-2017:0950-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-477.NASL
    description This update for libpng15 fixes the following issues : Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) This update was imported from the SUSE:SLE-12-SP1:Update update project.
    last seen 2019-02-21
    modified 2017-04-20
    plugin id 99428
    published 2017-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99428
    title openSUSE Security Update : libpng15 (openSUSE-2017-477)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0776-1.NASL
    description IBM Java was updated to version 6.0-16.20, fixing various security issues. More information can be found on http://www.i bm.com/developerworks/java/jdk/alerts/. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-18
    plugin id 89989
    published 2016-03-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89989
    title SUSE SLES10 Security Update : java-1_6_0-ibm (SUSE-SU-2016:0776-1) (SLOTH)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0901-1.NASL
    description This update for libpng12-0 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99165
    published 2017-04-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99165
    title SUSE SLES11 Security Update : libpng12-0 (SUSE-SU-2017:0901-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-AC8100927A.NASL
    description Latest upstream release, includes fixes for security vulnerabilities: CVE-2015-7981, CVE-2015-8126, CVE-2015-8540 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-10-18
    plugin id 89365
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89365
    title Fedora 22 : libpng12-1.2.56-1.fc22 (2015-ac8100927a)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-0101.NASL
    description Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494) Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All users of java-1.6.0-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 6 SR16-FP20 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 88557
    published 2016-02-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88557
    title RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2016:0101) (SLOTH)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0431-1.NASL
    description This update for java-1_6_0-ibm fixes the following issues by updating to 6.0-16.20 (bsc#963937) - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed : - bsc#960402: resolve package conflicts in devel package - bsc#960286: resolve package conflicts in the fonts subpackage Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 88709
    published 2016-02-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88709
    title SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2016:0431-1) (SLOTH)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-3443.NASL
    description Several vulnerabilities have been discovered in the libpng PNG library. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2015-8472 It was discovered that the original fix for CVE-2015-8126 was incomplete and did not detect a potential overrun by applications using png_set_PLTE directly. A remote attacker can take advantage of this flaw to cause a denial of service (application crash). - CVE-2015-8540 Xiao Qixue and Chen Yu discovered a flaw in the png_check_keyword function. A remote attacker can potentially take advantage of this flaw to cause a denial of service (application crash).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 87899
    published 2016-01-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=87899
    title Debian DSA-3443-1 : libpng - security update
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-0100.NASL
    description Updated java-1.7.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494) Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All users of java-1.7.0-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 7 SR9-FP30 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 88556
    published 2016-02-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88556
    title RHEL 5 : java-1.7.0-ibm (RHSA-2016:0100) (SLOTH)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-0099.NASL
    description Updated java-1.7.1-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 6 and 7 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494) Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. All users of java-1.7.1-ibm are advised to upgrade to these updated packages, containing the IBM Java SE 7R1 SR3-FP30 release. All running instances of IBM Java must be restarted for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-20
    plugin id 88555
    published 2016-02-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88555
    title RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2016:0099) (SLOTH)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-0433-1.NASL
    description This update for java-1_7_0-ibm fixes the following issues by updating to 7.0-9.30 (bsc#963937) : - CVE-2015-5041: Could could have invoked non-public interface methods under certain circumstances - CVE-2015-7575: The TLS protocol could allow weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker could exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials - CVE-2015-7981: libpng could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in the png_convert_to_rfc1123 function. An attacker could exploit this vulnerability to obtain sensitive information - CVE-2015-8126: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8472: buffer overflow in libpng caused by improper bounds checking by the png_set_PLTE() and png_get_PLTE() functions - CVE-2015-8540: libpng is vulnerable to a buffer overflow, caused by a read underflow in png_check_keyword in pngwutil.c. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. - CVE-2016-0402: An unspecified vulnerability related to the Networking component has no confidentiality impact, partial integrity impact, and no availability impact - CVE-2016-0448: An unspecified vulnerability related to the JMX component could allow a remote attacker to obtain sensitive information - CVE-2016-0466: An unspecified vulnerability related to the JAXP component could allow a remote attacker to cause a denial of service - CVE-2016-0483: An unspecified vulnerability related to the AWT component has complete confidentiality impact, complete integrity impact, and complete availability impact - CVE-2016-0494: An unspecified vulnerability related to the 2D component has complete confidentiality impact, complete integrity impact, and complete availability impact The following bugs were fixed : - bsc#960402: resolve package conflicts in devel package Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 88710
    published 2016-02-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=88710
    title SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2016:0433-1) (SLOTH)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2015-39499D9AF8.NASL
    description Latest upstream release, includes fixes for security vulnerabilities: CVE-2015-7981, CVE-2015-8126, CVE-2015-8540 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-10-18
    plugin id 89213
    published 2016-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89213
    title Fedora 23 : libpng12-1.2.56-1.fc23 (2015-39499d9af8)
redhat via4
advisories
rhsa
id RHSA-2016:1430
refmap via4
bid 80592
confirm
debian DSA-3443
fedora FEDORA-2015-3868cfa17b
gentoo GLSA-201611-08
mlist
  • [oss-security] 20151210 CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
  • [oss-security] 20151210 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
  • [oss-security] 20151211 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
  • [oss-security] 20151211 Re: Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
  • [oss-security] 20151217 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)
Last major update 28-11-2016 - 14:48
Published 14-04-2016 - 10:59
Last modified 03-11-2017 - 21:29
Back to Top