ID CVE-2015-7801
Summary Use-after-free vulnerability in OptiPNG 0.6.4 allows remote attackers to execute arbitrary code via a crafted PNG file. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
References
Vulnerable Configurations
  • cpe:2.3:a:optipng_project:optipng:0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:optipng_project:optipng:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:optipng_project:optipng:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 30-10-2018 - 16:27)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=1264015
mlist [oss-security] 20150916 CVE Request: Use-after-free in optipng 0.6.4
ubuntu USN-2951-1
Last major update 30-10-2018 - 16:27
Published 20-04-2016 - 16:59
Last modified 30-10-2018 - 16:27
Back to Top