ID CVE-2016-10087
Summary The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
References
Vulnerable Configurations
  • libpng 0.8
    cpe:2.3:a:libpng:libpng:0.8
  • libpng 0.71
    cpe:2.3:a:libpng:libpng:0.71
  • libpng 0.81
    cpe:2.3:a:libpng:libpng:0.81
  • libpng 0.82
    cpe:2.3:a:libpng:libpng:0.82
  • libpng 0.85
    cpe:2.3:a:libpng:libpng:0.85
  • libpng 0.86
    cpe:2.3:a:libpng:libpng:0.86
  • libpng 0.87
    cpe:2.3:a:libpng:libpng:0.87
  • libpng 0.88
    cpe:2.3:a:libpng:libpng:0.88
  • libpng 0.89
    cpe:2.3:a:libpng:libpng:0.89
  • libpng 0.89c
    cpe:2.3:a:libpng:libpng:0.89c
  • libpng 0.90
    cpe:2.3:a:libpng:libpng:0.90
  • libpng 0.95
    cpe:2.3:a:libpng:libpng:0.95
  • libpng 0.96
    cpe:2.3:a:libpng:libpng:0.96
  • libpng 0.97
    cpe:2.3:a:libpng:libpng:0.97
  • libpng 0.98
    cpe:2.3:a:libpng:libpng:0.98
  • libpng 0.99
    cpe:2.3:a:libpng:libpng:0.99
  • libpng 0.99a
    cpe:2.3:a:libpng:libpng:0.99a
  • libpng 0.99b
    cpe:2.3:a:libpng:libpng:0.99b
  • libpng 0.99c
    cpe:2.3:a:libpng:libpng:0.99c
  • libpng 0.99d
    cpe:2.3:a:libpng:libpng:0.99d
  • libpng 0.99e
    cpe:2.3:a:libpng:libpng:0.99e
  • libpng 0.99f
    cpe:2.3:a:libpng:libpng:0.99f
  • libpng 0.99g
    cpe:2.3:a:libpng:libpng:0.99g
  • libpng 0.99h
    cpe:2.3:a:libpng:libpng:0.99h
  • libpng 1.00
    cpe:2.3:a:libpng:libpng:1.00
  • libpng 1.0.0
    cpe:2.3:a:libpng:libpng:1.0.0
  • libpng 1.0.0a
    cpe:2.3:a:libpng:libpng:1.0.0a
  • libpng 1.0.0b
    cpe:2.3:a:libpng:libpng:1.0.0b
  • libpng 1.0.1
    cpe:2.3:a:libpng:libpng:1.0.1
  • libpng 1.0.1a
    cpe:2.3:a:libpng:libpng:1.0.1a
  • libpng 1.0.1b
    cpe:2.3:a:libpng:libpng:1.0.1b
  • libpng 1.0.1c
    cpe:2.3:a:libpng:libpng:1.0.1c
  • libpng 1.0.1d
    cpe:2.3:a:libpng:libpng:1.0.1d
  • libpng 1.0.1e
    cpe:2.3:a:libpng:libpng:1.0.1e
  • libpng 1.0.2
    cpe:2.3:a:libpng:libpng:1.0.2
  • libpng 1.0.2a
    cpe:2.3:a:libpng:libpng:1.0.2a
  • libpng 1.0.3
    cpe:2.3:a:libpng:libpng:1.0.3
  • libpng 1.0.3a
    cpe:2.3:a:libpng:libpng:1.0.3a
  • libpng 1.0.3b
    cpe:2.3:a:libpng:libpng:1.0.3b
  • libpng 1.0.3d
    cpe:2.3:a:libpng:libpng:1.0.3d
  • libpng 1.0.4
    cpe:2.3:a:libpng:libpng:1.0.4
  • libpng 1.0.4a
    cpe:2.3:a:libpng:libpng:1.0.4a
  • libpng 1.0.4b
    cpe:2.3:a:libpng:libpng:1.0.4b
  • libpng 1.0.4c
    cpe:2.3:a:libpng:libpng:1.0.4c
  • libpng 1.0.4d
    cpe:2.3:a:libpng:libpng:1.0.4d
  • libpng 1.0.4e
    cpe:2.3:a:libpng:libpng:1.0.4e
  • libpng 1.0.4f
    cpe:2.3:a:libpng:libpng:1.0.4f
  • libpng 1.0.5
    cpe:2.3:a:libpng:libpng:1.0.5
  • libpng 1.0.5a
    cpe:2.3:a:libpng:libpng:1.0.5a
  • libpng 1.0.5b
    cpe:2.3:a:libpng:libpng:1.0.5b
  • libpng 1.0.5c
    cpe:2.3:a:libpng:libpng:1.0.5c
  • libpng 1.0.5d
    cpe:2.3:a:libpng:libpng:1.0.5d
  • libpng 1.0.5e
    cpe:2.3:a:libpng:libpng:1.0.5e
  • libpng 1.0.5f
    cpe:2.3:a:libpng:libpng:1.0.5f
  • libpng 1.0.5g
    cpe:2.3:a:libpng:libpng:1.0.5g
  • libpng 1.0.5h
    cpe:2.3:a:libpng:libpng:1.0.5h
  • libpng 1.0.5i
    cpe:2.3:a:libpng:libpng:1.0.5i
  • libpng 1.0.5j
    cpe:2.3:a:libpng:libpng:1.0.5j
  • libpng 1.0.5k
    cpe:2.3:a:libpng:libpng:1.0.5k
  • libpng 1.0.5l
    cpe:2.3:a:libpng:libpng:1.0.5l
  • libpng 1.0.5m
    cpe:2.3:a:libpng:libpng:1.0.5m
  • libpng 1.0.5n
    cpe:2.3:a:libpng:libpng:1.0.5n
  • libpng 1.0.5o
    cpe:2.3:a:libpng:libpng:1.0.5o
  • libpng 1.0.5p
    cpe:2.3:a:libpng:libpng:1.0.5p
  • libpng 1.0.5q
    cpe:2.3:a:libpng:libpng:1.0.5q
  • libpng 1.0.5r
    cpe:2.3:a:libpng:libpng:1.0.5r
  • libpng 1.0.5s
    cpe:2.3:a:libpng:libpng:1.0.5s
  • libpng 1.0.5t
    cpe:2.3:a:libpng:libpng:1.0.5t
  • libpng 1.0.5u
    cpe:2.3:a:libpng:libpng:1.0.5u
  • libpng 1.0.5v
    cpe:2.3:a:libpng:libpng:1.0.5v
  • libpng 1.0.6
    cpe:2.3:a:libpng:libpng:1.0.6
  • libpng 1.0.6d
    cpe:2.3:a:libpng:libpng:1.0.6d
  • libpng 1.0.6e
    cpe:2.3:a:libpng:libpng:1.0.6e
  • libpng 1.0.6f
    cpe:2.3:a:libpng:libpng:1.0.6f
  • libpng 1.0.6g
    cpe:2.3:a:libpng:libpng:1.0.6g
  • libpng 1.0.6h
    cpe:2.3:a:libpng:libpng:1.0.6h
  • libpng 1.0.6i
    cpe:2.3:a:libpng:libpng:1.0.6i
  • libpng 1.0.6j
    cpe:2.3:a:libpng:libpng:1.0.6j
  • libpng 1.0.7
    cpe:2.3:a:libpng:libpng:1.0.7
  • libpng 1.0.8
    cpe:2.3:a:libpng:libpng:1.0.8
  • libpng 1.0.9
    cpe:2.3:a:libpng:libpng:1.0.9
  • libpng 1.0.10
    cpe:2.3:a:libpng:libpng:1.0.10
  • libpng 1.0.11
    cpe:2.3:a:libpng:libpng:1.0.11
  • libpng 1.0.12
    cpe:2.3:a:libpng:libpng:1.0.12
  • libpng 1.0.13
    cpe:2.3:a:libpng:libpng:1.0.13
  • libpng 1.0.14
    cpe:2.3:a:libpng:libpng:1.0.14
  • libpng 1.0.15
    cpe:2.3:a:libpng:libpng:1.0.15
  • libpng 1.0.16
    cpe:2.3:a:libpng:libpng:1.0.16
  • libpng 1.0.17
    cpe:2.3:a:libpng:libpng:1.0.17
  • libpng 1.0.18
    cpe:2.3:a:libpng:libpng:1.0.18
  • libpng 1.0.19
    cpe:2.3:a:libpng:libpng:1.0.19
  • libpng 1.0.20
    cpe:2.3:a:libpng:libpng:1.0.20
  • libpng 1.0.21
    cpe:2.3:a:libpng:libpng:1.0.21
  • libpng 1.0.22
    cpe:2.3:a:libpng:libpng:1.0.22
  • libpng 1.0.23
    cpe:2.3:a:libpng:libpng:1.0.23
  • libpng 1.0.24
    cpe:2.3:a:libpng:libpng:1.0.24
  • libpng 1.0.25
    cpe:2.3:a:libpng:libpng:1.0.25
  • libpng 1.0.26
    cpe:2.3:a:libpng:libpng:1.0.26
  • libpng 1.0.27
    cpe:2.3:a:libpng:libpng:1.0.27
  • libpng 1.0.28
    cpe:2.3:a:libpng:libpng:1.0.28
  • libpng 1.0.29
    cpe:2.3:a:libpng:libpng:1.0.29
  • libpng 1.0.30
    cpe:2.3:a:libpng:libpng:1.0.30
  • libpng 1.0.31
    cpe:2.3:a:libpng:libpng:1.0.31
  • libpng 1.0.32
    cpe:2.3:a:libpng:libpng:1.0.32
  • libpng 1.0.33
    cpe:2.3:a:libpng:libpng:1.0.33
  • libpng 1.0.34
    cpe:2.3:a:libpng:libpng:1.0.34
  • libpng 1.0.35
    cpe:2.3:a:libpng:libpng:1.0.35
  • libpng 1.0.37
    cpe:2.3:a:libpng:libpng:1.0.37
  • libpng 1.0.38
    cpe:2.3:a:libpng:libpng:1.0.38
  • libpng 1.0.39
    cpe:2.3:a:libpng:libpng:1.0.39
  • libpng 1.0.40
    cpe:2.3:a:libpng:libpng:1.0.40
  • libpng 1.0.41
    cpe:2.3:a:libpng:libpng:1.0.41
  • libpng 1.0.42
    cpe:2.3:a:libpng:libpng:1.0.42
  • libpng 1.0.43
    cpe:2.3:a:libpng:libpng:1.0.43
  • libpng 1.0.44
    cpe:2.3:a:libpng:libpng:1.0.44
  • libpng 1.0.45
    cpe:2.3:a:libpng:libpng:1.0.45
  • libpng 1.0.46
    cpe:2.3:a:libpng:libpng:1.0.46
  • libpng 1.0.47
    cpe:2.3:a:libpng:libpng:1.0.47
  • libpng 1.0.48
    cpe:2.3:a:libpng:libpng:1.0.48
  • libpng 1.0.50
    cpe:2.3:a:libpng:libpng:1.0.50
  • libpng 1.0.51
    cpe:2.3:a:libpng:libpng:1.0.51
  • libpng 1.0.52
    cpe:2.3:a:libpng:libpng:1.0.52
  • libpng 1.0.53
    cpe:2.3:a:libpng:libpng:1.0.53
  • libpng 1.0.54
    cpe:2.3:a:libpng:libpng:1.0.54
  • libpng 1.0.55
    cpe:2.3:a:libpng:libpng:1.0.55
  • libpng 1.0.56
    cpe:2.3:a:libpng:libpng:1.0.56
  • libpng 1.0.57
    cpe:2.3:a:libpng:libpng:1.0.57
  • libpng 1.0.58
    cpe:2.3:a:libpng:libpng:1.0.58
  • libpng 1.0.59
    cpe:2.3:a:libpng:libpng:1.0.59
  • libpng 1.0.60
    cpe:2.3:a:libpng:libpng:1.0.60
  • libpng 1.0.61
    cpe:2.3:a:libpng:libpng:1.0.61
  • libpng 1.0.62
    cpe:2.3:a:libpng:libpng:1.0.62
  • libpng 1.0.63
    cpe:2.3:a:libpng:libpng:1.0.63
  • Libpng Libpng 1.0.64
    cpe:2.3:a:libpng:libpng:1.0.64
  • libpng 1.0.65
    cpe:2.3:a:libpng:libpng:1.0.65
  • libpng 1.0.66
    cpe:2.3:a:libpng:libpng:1.0.66
  • libpng 1.2.0
    cpe:2.3:a:libpng:libpng:1.2.0
  • libpng 1.2.1
    cpe:2.3:a:libpng:libpng:1.2.1
  • libpng 1.2.3
    cpe:2.3:a:libpng:libpng:1.2.3
  • libpng 1.2.4
    cpe:2.3:a:libpng:libpng:1.2.4
  • libpng 1.2.6
    cpe:2.3:a:libpng:libpng:1.2.6
  • libpng 1.2.8
    cpe:2.3:a:libpng:libpng:1.2.8
  • libpng 1.2.10
    cpe:2.3:a:libpng:libpng:1.2.10
  • libpng 1.2.12
    cpe:2.3:a:libpng:libpng:1.2.12
  • libpng 1.2.13
    cpe:2.3:a:libpng:libpng:1.2.13
  • libpng 1.2.14
    cpe:2.3:a:libpng:libpng:1.2.14
  • libpng 1.2.16
    cpe:2.3:a:libpng:libpng:1.2.16
  • libpng 1.2.18
    cpe:2.3:a:libpng:libpng:1.2.18
  • libpng 1.2.20
    cpe:2.3:a:libpng:libpng:1.2.20
  • libpng 1.2.21
    cpe:2.3:a:libpng:libpng:1.2.21
  • libpng 1.2.22
    cpe:2.3:a:libpng:libpng:1.2.22
  • libpng 1.2.24
    cpe:2.3:a:libpng:libpng:1.2.24
  • libpng 1.2.25
    cpe:2.3:a:libpng:libpng:1.2.25
  • libpng 1.2.26
    cpe:2.3:a:libpng:libpng:1.2.26
  • libpng 1.2.27
    cpe:2.3:a:libpng:libpng:1.2.27
  • libpng 1.2.29
    cpe:2.3:a:libpng:libpng:1.2.29
  • libpng 1.2.32
    cpe:2.3:a:libpng:libpng:1.2.32
  • libpng 1.2.33
    cpe:2.3:a:libpng:libpng:1.2.33
  • libpng 1.2.35
    cpe:2.3:a:libpng:libpng:1.2.35
  • libpng 1.2.37
    cpe:2.3:a:libpng:libpng:1.2.37
  • libpng 1.2.38
    cpe:2.3:a:libpng:libpng:1.2.38
  • libpng 1.2.39
    cpe:2.3:a:libpng:libpng:1.2.39
  • libpng 1.2.41
    cpe:2.3:a:libpng:libpng:1.2.41
  • libpng 1.2.42
    cpe:2.3:a:libpng:libpng:1.2.42
  • libpng 1.2.44
    cpe:2.3:a:libpng:libpng:1.2.44
  • libpng 1.2.45
    cpe:2.3:a:libpng:libpng:1.2.45
  • libpng 1.2.46
    cpe:2.3:a:libpng:libpng:1.2.46
  • libpng 1.2.47
    cpe:2.3:a:libpng:libpng:1.2.47
  • Libpng Libpng 1.2.50
    cpe:2.3:a:libpng:libpng:1.2.50
  • Libpng Libpng 1.2.51
    cpe:2.3:a:libpng:libpng:1.2.51
  • Libpng Libpng 1.2.52
    cpe:2.3:a:libpng:libpng:1.2.52
  • Libpng Libpng 1.2.53
    cpe:2.3:a:libpng:libpng:1.2.53
  • Libpng Libpng 1.2.54
    cpe:2.3:a:libpng:libpng:1.2.54
  • libpng 1.2.55
    cpe:2.3:a:libpng:libpng:1.2.55
  • libpng 1.2.56
    cpe:2.3:a:libpng:libpng:1.2.56
  • libpng 1.4.0
    cpe:2.3:a:libpng:libpng:1.4.0
  • libpng 1.4.1
    cpe:2.3:a:libpng:libpng:1.4.1
  • libpng 1.4.2
    cpe:2.3:a:libpng:libpng:1.4.2
  • libpng 1.4.3
    cpe:2.3:a:libpng:libpng:1.4.3
  • libpng 1.4.4
    cpe:2.3:a:libpng:libpng:1.4.4
  • libpng 1.4.5
    cpe:2.3:a:libpng:libpng:1.4.5
  • libpng 1.4.6
    cpe:2.3:a:libpng:libpng:1.4.6
  • libpng 1.4.7
    cpe:2.3:a:libpng:libpng:1.4.7
  • libpng 1.4.8
    cpe:2.3:a:libpng:libpng:1.4.8
  • libpng 1.4.9
    cpe:2.3:a:libpng:libpng:1.4.9
  • libpng 1.4.10
    cpe:2.3:a:libpng:libpng:1.4.10
  • Libpng Libpng 1.4.11
    cpe:2.3:a:libpng:libpng:1.4.11
  • Libpng Libpng 1.4.12
    cpe:2.3:a:libpng:libpng:1.4.12
  • Libpng Libpng 1.4.13
    cpe:2.3:a:libpng:libpng:1.4.13
  • Libpng Libpng 1.4.14
    cpe:2.3:a:libpng:libpng:1.4.14
  • Libpng Libpng 1.4.15
    cpe:2.3:a:libpng:libpng:1.4.15
  • Libpng Libpng 1.4.16
    cpe:2.3:a:libpng:libpng:1.4.16
  • Libpng Libpng 1.4.17
    cpe:2.3:a:libpng:libpng:1.4.17
  • libpng 1.4.18
    cpe:2.3:a:libpng:libpng:1.4.18
  • libpng 1.4.19
    cpe:2.3:a:libpng:libpng:1.4.19
  • libpng 1.2.55
    cpe:2.3:a:libpng:libpng:1.2.55
  • cpe:2.3:a:libpng:libpng:1.5.0
    cpe:2.3:a:libpng:libpng:1.5.0
  • libpng 1.5.1
    cpe:2.3:a:libpng:libpng:1.5.1
  • libpng 1.5.2
    cpe:2.3:a:libpng:libpng:1.5.2
  • cpe:2.3:a:libpng:libpng:1.5.3
    cpe:2.3:a:libpng:libpng:1.5.3
  • libpng 1.5.4
    cpe:2.3:a:libpng:libpng:1.5.4
  • libpng 1.5.5
    cpe:2.3:a:libpng:libpng:1.5.5
  • libpng 1.5.6
    cpe:2.3:a:libpng:libpng:1.5.6
  • libpng 1.5.7
    cpe:2.3:a:libpng:libpng:1.5.7
  • libpng 1.5.8
    cpe:2.3:a:libpng:libpng:1.5.8
  • libpng 1.5.9
    cpe:2.3:a:libpng:libpng:1.5.9
  • cpe:2.3:a:libpng:libpng:1.5.10
    cpe:2.3:a:libpng:libpng:1.5.10
  • libpng 1.5.11
    cpe:2.3:a:libpng:libpng:1.5.11
  • libpng 1.5.12
    cpe:2.3:a:libpng:libpng:1.5.12
  • libpng 1.5.13
    cpe:2.3:a:libpng:libpng:1.5.13
  • Libpng Libpng 1.5.14
    cpe:2.3:a:libpng:libpng:1.5.14
  • Libpng Libpng 1.5.15
    cpe:2.3:a:libpng:libpng:1.5.15
  • Libpng Libpng 1.5.16
    cpe:2.3:a:libpng:libpng:1.5.16
  • Libpng Libpng 1.5.17
    cpe:2.3:a:libpng:libpng:1.5.17
  • Libpng Libpng 1.5.18
    cpe:2.3:a:libpng:libpng:1.5.18
  • Libpng Libpng 1.5.19
    cpe:2.3:a:libpng:libpng:1.5.19
  • cpe:2.3:a:libpng:libpng:1.5.20
    cpe:2.3:a:libpng:libpng:1.5.20
  • Libpng Libpng 1.5.21
    cpe:2.3:a:libpng:libpng:1.5.21
  • Libpng Libpng 1.5.22
    cpe:2.3:a:libpng:libpng:1.5.22
  • Libpng Libpng 1.5.23
    cpe:2.3:a:libpng:libpng:1.5.23
  • Libpng Libpng 1.5.24
    cpe:2.3:a:libpng:libpng:1.5.24
  • libpng 1.5.25
    cpe:2.3:a:libpng:libpng:1.5.25
  • libpng 1.5.26
    cpe:2.3:a:libpng:libpng:1.5.26
  • libpng 1.5.27
    cpe:2.3:a:libpng:libpng:1.5.27
  • libpng 1.2.55
    cpe:2.3:a:libpng:libpng:1.2.55
  • libpng 1.6.0
    cpe:2.3:a:libpng:libpng:1.6.0
  • libpng 1.6.1
    cpe:2.3:a:libpng:libpng:1.6.1
  • libpng 1.6.2
    cpe:2.3:a:libpng:libpng:1.6.2
  • libpng 1.6.3
    cpe:2.3:a:libpng:libpng:1.6.3
  • libpng 1.6.4
    cpe:2.3:a:libpng:libpng:1.6.4
  • libpng 1.6.5
    cpe:2.3:a:libpng:libpng:1.6.5
  • libpng 1.6.6
    cpe:2.3:a:libpng:libpng:1.6.6
  • libpng 1.6.7
    cpe:2.3:a:libpng:libpng:1.6.7
  • libpng 1.6.8
    cpe:2.3:a:libpng:libpng:1.6.8
  • libpng 1.6.9
    cpe:2.3:a:libpng:libpng:1.6.9
  • libpng libpng 1.6.10
    cpe:2.3:a:libpng:libpng:1.6.10
  • libpng libpng 1.6.11
    cpe:2.3:a:libpng:libpng:1.6.11
  • cpe:2.3:a:libpng:libpng:1.6.12
    cpe:2.3:a:libpng:libpng:1.6.12
  • libpng libpng 1.6.13
    cpe:2.3:a:libpng:libpng:1.6.13
  • libpng libpng 1.6.14
    cpe:2.3:a:libpng:libpng:1.6.14
  • libpng libpng 1.6.15
    cpe:2.3:a:libpng:libpng:1.6.15
  • Libpng Libpng 1.6.16
    cpe:2.3:a:libpng:libpng:1.6.16
  • Libpng Libpng 1.6.17
    cpe:2.3:a:libpng:libpng:1.6.17
  • libpng libpng 1.6.18
    cpe:2.3:a:libpng:libpng:1.6.18
  • Libpng Libpng 1.6.19
    cpe:2.3:a:libpng:libpng:1.6.19
  • libpng 1.6.20
    cpe:2.3:a:libpng:libpng:1.6.20
  • libpng 1.6.21
    cpe:2.3:a:libpng:libpng:1.6.21
  • libpng 1.6.22
    cpe:2.3:a:libpng:libpng:1.6.22
  • libpng 1.6.23
    cpe:2.3:a:libpng:libpng:1.6.23
  • libpng 1.6.24
    cpe:2.3:a:libpng:libpng:1.6.24
  • libpng 1.6.25
    cpe:2.3:a:libpng:libpng:1.6.25
  • libpng 1.6.26
    cpe:2.3:a:libpng:libpng:1.6.26
CVSS
Base: 5.0 (as of 28-02-2017 - 09:49)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-CF1944F480.NASL
    description - Update to upstream release **1.5.28**. - Fixes **CVE-2016-10087**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-04-13
    plugin id 99322
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99322
    title Fedora 25 : libpng15 (2017-cf1944f480)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-1A7E14D084.NASL
    description This update fixes an old NULL pointer dereference bug in png_set_text_2() discovered and patched by Patrick Keshishian (CVE-2016-10087). The potential 'NULL dereference' bug has existed in libpng since version 0.71 of June 26, 1995. To be vulnerable, an application has to load a text chunk into the png structure, then delete all text, then add another text chunk to the same png structure, which seems to be an unlikely sequence, but it has happened. The update also fixes some documentation typos and an instance of undefined behavior. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-03-06
    plugin id 96350
    published 2017-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=96350
    title Fedora 24 : libpng10 (2016-1a7e14d084)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2016-365-01.NASL
    description New libpng packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
    last seen 2019-02-21
    modified 2017-09-21
    plugin id 96179
    published 2017-01-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=96179
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / 14.2 / current : libpng (SSA:2016-365-01)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-84BC8AC268.NASL
    description - Update to upstream release **1.2.57**. - Fixes **CVE-2016-10087**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-04-17
    plugin id 99412
    published 2017-04-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99412
    title Fedora 24 : libpng12 (2017-84bc8ac268)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-1D305FA070.NASL
    description - Update to upstream release **1.2.57**. - Fixes **CVE-2016-10087**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-07-17
    plugin id 101582
    published 2017-07-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=101582
    title Fedora 26 : libpng12 (2017-1d305fa070)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-441.NASL
    description This update for libpng12 fixes the following issues : Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2017-04-06
    plugin id 99211
    published 2017-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99211
    title openSUSE Security Update : libpng12 (openSUSE-2017-441)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0860-1.NASL
    description This update for libpng12 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99088
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99088
    title SUSE SLED12 / SLES12 Security Update : libpng12 (SUSE-SU-2017:0860-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0950-1.NASL
    description This update for libpng15 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99243
    published 2017-04-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99243
    title SUSE SLED12 / SLES12 Security Update : libpng15 (SUSE-SU-2017:0950-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-477.NASL
    description This update for libpng15 fixes the following issues : Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) This update was imported from the SUSE:SLE-12-SP1:Update update project.
    last seen 2019-02-21
    modified 2017-04-20
    plugin id 99428
    published 2017-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99428
    title openSUSE Security Update : libpng15 (openSUSE-2017-477)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2017-443.NASL
    description This update for libpng16 fixes the following issues : Security issues fixed : - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2019-02-21
    modified 2017-04-06
    plugin id 99213
    published 2017-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99213
    title openSUSE Security Update : libpng16 (openSUSE-2017-443)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-BAD9942E42.NASL
    description - Update to upstream release **1.2.57**. - Fixes **CVE-2016-10087**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-04-17
    plugin id 99416
    published 2017-04-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99416
    title Fedora 25 : libpng12 (2017-bad9942e42)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0901-1.NASL
    description This update for libpng12-0 fixes the following issues: Security issues fixed : - CVE-2015-8540: read underflow in libpng (bsc#958791) - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99165
    published 2017-04-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99165
    title SUSE SLES11 Security Update : libpng12-0 (SUSE-SU-2017:0901-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201701-74.NASL
    description The remote host is affected by the vulnerability described in GLSA-201701-74 (libpng: Remote execution of arbitrary code) A NULL pointer dereference was discovered in libpng in the png_push_save_buffer function. In order to be vulnerable, an application has to load a text chunk into the PNG structure, then delete all text, then add another text chunk to the same PNG structure, which seems to be an unlikely sequence, but it is possible. Impact : A remote attacker, by enticing a user to process a specially crafted PNG file, could execute arbitrary code with the privileges of the process. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2017-03-06
    plugin id 96860
    published 2017-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=96860
    title GLSA-201701-74 : libpng: Remote execution of arbitrary code
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2017-0853-1.NASL
    description This update for libpng16 fixes the following issues: Security issues fixed : - CVE-2016-10087: NULL pointer dereference in png_set_text_2() (bsc#1017646) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 99085
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99085
    title SUSE SLED12 / SLES12 Security Update : libpng16 (SUSE-SU-2017:0853-1)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3712-1.NASL
    description Patrick Keshishian discovered that libpng incorrectly handled certain PNG files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10087) Thuan Pham discovered that libpng incorrectly handled certain PNG files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-13785). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 111040
    published 2018-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111040
    title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libpng, libpng1.6 vulnerabilities (USN-3712-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2017-66FD940572.NASL
    description - Update to upstream release **1.5.28**. - Fixes **CVE-2016-10087**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-04-13
    plugin id 99319
    published 2017-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99319
    title Fedora 24 : libpng15 (2017-66fd940572)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-A4B06A036B.NASL
    description This update fixes an old NULL pointer dereference bug in png_set_text_2() discovered and patched by Patrick Keshishian (CVE-2016-10087). The potential 'NULL dereference' bug has existed in libpng since version 0.71 of June 26, 1995. To be vulnerable, an application has to load a text chunk into the png structure, then delete all text, then add another text chunk to the same png structure, which seems to be an unlikely sequence, but it has happened. The update also fixes some documentation typos and an instance of undefined behavior. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2017-03-06
    plugin id 96353
    published 2017-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=96353
    title Fedora 25 : libpng10 (2016-a4b06a036b)
refmap via4
bid 95157
gentoo GLSA-201701-74
mlist
  • [oss-security] 20161229 libpng NULL pointer dereference bugfix
  • [oss-security] 20161230 Re: libpng NULL pointer dereference bugfix
ubuntu
  • USN-3712-1
  • USN-3712-2
Last major update 28-02-2017 - 10:06
Published 30-01-2017 - 17:59
Last modified 12-07-2018 - 21:29
Back to Top