CVE-2008-1382
Vulnerability from cvelistv5
Published
2008-04-14 16:00
Modified
2024-08-07 08:17
Severity ?
Summary
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
References
secalert@redhat.comhttp://libpng.sourceforge.net/Advisory-1.2.26.txt
secalert@redhat.comhttp://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2009/May/msg00002.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
secalert@redhat.comhttp://secunia.com/advisories/29678
secalert@redhat.comhttp://secunia.com/advisories/29792Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/29957
secalert@redhat.comhttp://secunia.com/advisories/29992
secalert@redhat.comhttp://secunia.com/advisories/30009
secalert@redhat.comhttp://secunia.com/advisories/30157
secalert@redhat.comhttp://secunia.com/advisories/30174
secalert@redhat.comhttp://secunia.com/advisories/30402
secalert@redhat.comhttp://secunia.com/advisories/30486
secalert@redhat.comhttp://secunia.com/advisories/31882
secalert@redhat.comhttp://secunia.com/advisories/33137
secalert@redhat.comhttp://secunia.com/advisories/34152
secalert@redhat.comhttp://secunia.com/advisories/34388
secalert@redhat.comhttp://secunia.com/advisories/35074
secalert@redhat.comhttp://secunia.com/advisories/35258
secalert@redhat.comhttp://secunia.com/advisories/35302
secalert@redhat.comhttp://secunia.com/advisories/35386
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200804-15.xml
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200805-10.xml
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200812-15.xml
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.541247
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
secalert@redhat.comhttp://support.apple.com/kb/HT3549
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1750
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:156
secalert@redhat.comhttp://www.ocert.org/advisories/ocert-2008-003.html
secalert@redhat.comhttp://www.osvdb.org/44364
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2009-0333.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/490823/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/491424/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/503912/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/28770
secalert@redhat.comhttp://www.securitytracker.com/id?1019840
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA08-260A.htmlUS Government Resource
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA09-133A.htmlUS Government Resource
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2009-0007.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/1225/references
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2584
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1297
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1451
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1462
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1560
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/41800
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html
af854a3a-2127-422b-91ae-364da2661108http://libpng.sourceforge.net/Advisory-1.2.26.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29678
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29792Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29957
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29992
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30009
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30157
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30174
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30402
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30486
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31882
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33137
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34152
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34388
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35074
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35258
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35302
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35386
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-15.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-10.xml
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200812-15.xml
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.541247
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3549
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1750
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:156
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/advisories/ocert-2008-003.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/44364
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-0333.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/490823/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/491424/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/503912/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28770
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019840
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-260A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA09-133A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0007.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1225/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2584
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1297
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1451
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1462
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1560
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41800
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.684Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
          },
          {
            "name": "RHSA-2009:0333",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html"
          },
          {
            "name": "35386",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35386"
          },
          {
            "name": "ADV-2008-1225",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1225/references"
          },
          {
            "name": "30157",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30157"
          },
          {
            "name": "30174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30174"
          },
          {
            "name": "1020521",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3549"
          },
          {
            "name": "APPLE-SA-2008-09-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
          },
          {
            "name": "44364",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/44364"
          },
          {
            "name": "ADV-2009-1560",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1560"
          },
          {
            "name": "34388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34388"
          },
          {
            "name": "ADV-2009-1462",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1462"
          },
          {
            "name": "GLSA-200805-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-10.xml"
          },
          {
            "name": "FEDORA-2008-4910",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html"
          },
          {
            "name": "FEDORA-2008-3937",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html"
          },
          {
            "name": "30486",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30486"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html"
          },
          {
            "name": "TA08-260A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
          },
          {
            "name": "30402",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30402"
          },
          {
            "name": "259989",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
          },
          {
            "name": "35302",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35302"
          },
          {
            "name": "FEDORA-2008-4847",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html"
          },
          {
            "name": "SSA:2008-119-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.541247"
          },
          {
            "name": "20080429 rPSA-2008-0151-1 libpng",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/491424/100/0/threaded"
          },
          {
            "name": "35074",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35074"
          },
          {
            "name": "ADV-2008-2584",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2584"
          },
          {
            "name": "29792",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29792"
          },
          {
            "name": "1019840",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019840"
          },
          {
            "name": "ADV-2009-1451",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1451"
          },
          {
            "name": "APPLE-SA-2009-05-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
          },
          {
            "name": "31882",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31882"
          },
          {
            "name": "GLSA-200804-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-15.xml"
          },
          {
            "name": "29992",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29992"
          },
          {
            "name": "FEDORA-2008-3683",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html"
          },
          {
            "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded"
          },
          {
            "name": "29678",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29678"
          },
          {
            "name": "libpng-zero-length-code-execution(41800)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41800"
          },
          {
            "name": "GLSA-200812-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200812-15.xml"
          },
          {
            "name": "DSA-1750",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1750"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ocert.org/advisories/ocert-2008-003.html"
          },
          {
            "name": "20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/490823/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libpng.sourceforge.net/Advisory-1.2.26.txt"
          },
          {
            "name": "oval:org.mitre.oval:def:10326",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326"
          },
          {
            "name": "TA09-133A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
          },
          {
            "name": "ADV-2009-1297",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1297"
          },
          {
            "name": "33137",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33137"
          },
          {
            "name": "oval:org.mitre.oval:def:6275",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275"
          },
          {
            "name": "34152",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34152"
          },
          {
            "name": "MDVSA-2008:156",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:156"
          },
          {
            "name": "35258",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35258"
          },
          {
            "name": "30009",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30009"
          },
          {
            "name": "28770",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28770"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
          },
          {
            "name": "29957",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29957"
          },
          {
            "name": "FEDORA-2008-3979",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html"
          },
          {
            "name": "FEDORA-2008-4947",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length \"unknown\" chunks, which trigger an access of uninitialized memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
        },
        {
          "name": "RHSA-2009:0333",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html"
        },
        {
          "name": "35386",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35386"
        },
        {
          "name": "ADV-2008-1225",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1225/references"
        },
        {
          "name": "30157",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30157"
        },
        {
          "name": "30174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30174"
        },
        {
          "name": "1020521",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3549"
        },
        {
          "name": "APPLE-SA-2008-09-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
        },
        {
          "name": "44364",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/44364"
        },
        {
          "name": "ADV-2009-1560",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1560"
        },
        {
          "name": "34388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34388"
        },
        {
          "name": "ADV-2009-1462",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1462"
        },
        {
          "name": "GLSA-200805-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-10.xml"
        },
        {
          "name": "FEDORA-2008-4910",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html"
        },
        {
          "name": "FEDORA-2008-3937",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html"
        },
        {
          "name": "30486",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30486"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html"
        },
        {
          "name": "TA08-260A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
        },
        {
          "name": "30402",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30402"
        },
        {
          "name": "259989",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
        },
        {
          "name": "35302",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35302"
        },
        {
          "name": "FEDORA-2008-4847",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html"
        },
        {
          "name": "SSA:2008-119-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.541247"
        },
        {
          "name": "20080429 rPSA-2008-0151-1 libpng",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/491424/100/0/threaded"
        },
        {
          "name": "35074",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35074"
        },
        {
          "name": "ADV-2008-2584",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2584"
        },
        {
          "name": "29792",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29792"
        },
        {
          "name": "1019840",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019840"
        },
        {
          "name": "ADV-2009-1451",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1451"
        },
        {
          "name": "APPLE-SA-2009-05-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
        },
        {
          "name": "31882",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31882"
        },
        {
          "name": "GLSA-200804-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-15.xml"
        },
        {
          "name": "29992",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29992"
        },
        {
          "name": "FEDORA-2008-3683",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html"
        },
        {
          "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded"
        },
        {
          "name": "29678",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29678"
        },
        {
          "name": "libpng-zero-length-code-execution(41800)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41800"
        },
        {
          "name": "GLSA-200812-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200812-15.xml"
        },
        {
          "name": "DSA-1750",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1750"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ocert.org/advisories/ocert-2008-003.html"
        },
        {
          "name": "20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/490823/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libpng.sourceforge.net/Advisory-1.2.26.txt"
        },
        {
          "name": "oval:org.mitre.oval:def:10326",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326"
        },
        {
          "name": "TA09-133A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
        },
        {
          "name": "ADV-2009-1297",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1297"
        },
        {
          "name": "33137",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33137"
        },
        {
          "name": "oval:org.mitre.oval:def:6275",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275"
        },
        {
          "name": "34152",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34152"
        },
        {
          "name": "MDVSA-2008:156",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:156"
        },
        {
          "name": "35258",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35258"
        },
        {
          "name": "30009",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30009"
        },
        {
          "name": "28770",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28770"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
        },
        {
          "name": "29957",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29957"
        },
        {
          "name": "FEDORA-2008-3979",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html"
        },
        {
          "name": "FEDORA-2008-4947",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-1382",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length \"unknown\" chunks, which trigger an access of uninitialized memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:010",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html"
            },
            {
              "name": "RHSA-2009:0333",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html"
            },
            {
              "name": "35386",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35386"
            },
            {
              "name": "ADV-2008-1225",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1225/references"
            },
            {
              "name": "30157",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30157"
            },
            {
              "name": "30174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30174"
            },
            {
              "name": "1020521",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
            },
            {
              "name": "http://support.apple.com/kb/HT3549",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3549"
            },
            {
              "name": "APPLE-SA-2008-09-15",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
            },
            {
              "name": "44364",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/44364"
            },
            {
              "name": "ADV-2009-1560",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1560"
            },
            {
              "name": "34388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34388"
            },
            {
              "name": "ADV-2009-1462",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1462"
            },
            {
              "name": "GLSA-200805-10",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-10.xml"
            },
            {
              "name": "FEDORA-2008-4910",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html"
            },
            {
              "name": "FEDORA-2008-3937",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html"
            },
            {
              "name": "30486",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30486"
            },
            {
              "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html"
            },
            {
              "name": "TA08-260A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
            },
            {
              "name": "30402",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30402"
            },
            {
              "name": "259989",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
            },
            {
              "name": "35302",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35302"
            },
            {
              "name": "FEDORA-2008-4847",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html"
            },
            {
              "name": "SSA:2008-119-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.541247"
            },
            {
              "name": "20080429 rPSA-2008-0151-1 libpng",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/491424/100/0/threaded"
            },
            {
              "name": "35074",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35074"
            },
            {
              "name": "ADV-2008-2584",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2584"
            },
            {
              "name": "29792",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29792"
            },
            {
              "name": "1019840",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019840"
            },
            {
              "name": "ADV-2009-1451",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1451"
            },
            {
              "name": "APPLE-SA-2009-05-12",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
            },
            {
              "name": "31882",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31882"
            },
            {
              "name": "GLSA-200804-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-15.xml"
            },
            {
              "name": "29992",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29992"
            },
            {
              "name": "FEDORA-2008-3683",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html"
            },
            {
              "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded"
            },
            {
              "name": "29678",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29678"
            },
            {
              "name": "libpng-zero-length-code-execution(41800)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41800"
            },
            {
              "name": "GLSA-200812-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200812-15.xml"
            },
            {
              "name": "DSA-1750",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1750"
            },
            {
              "name": "http://www.ocert.org/advisories/ocert-2008-003.html",
              "refsource": "MISC",
              "url": "http://www.ocert.org/advisories/ocert-2008-003.html"
            },
            {
              "name": "20080414 [oCERT-2008-003] libpng zero-length chunks incorrect handling",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/490823/100/0/threaded"
            },
            {
              "name": "http://libpng.sourceforge.net/Advisory-1.2.26.txt",
              "refsource": "CONFIRM",
              "url": "http://libpng.sourceforge.net/Advisory-1.2.26.txt"
            },
            {
              "name": "oval:org.mitre.oval:def:10326",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326"
            },
            {
              "name": "TA09-133A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
            },
            {
              "name": "ADV-2009-1297",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1297"
            },
            {
              "name": "33137",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33137"
            },
            {
              "name": "oval:org.mitre.oval:def:6275",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275"
            },
            {
              "name": "34152",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34152"
            },
            {
              "name": "MDVSA-2008:156",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:156"
            },
            {
              "name": "35258",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35258"
            },
            {
              "name": "30009",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30009"
            },
            {
              "name": "28770",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28770"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
            },
            {
              "name": "29957",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29957"
            },
            {
              "name": "FEDORA-2008-3979",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html"
            },
            {
              "name": "FEDORA-2008-4947",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-1382",
    "datePublished": "2008-04-14T16:00:00",
    "dateReserved": "2008-03-18T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.684Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-1382\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-04-14T16:05:00.000\",\"lastModified\":\"2024-11-21T00:44:24.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length \\\"unknown\\\" chunks, which trigger an access of uninitialized memory.\"},{\"lang\":\"es\",\"value\":\"libpng versions de la 1.0.6 hasta la 1.0.32, 1.2.0 hasta la 1.2.26 y 1.4.0beta01 hasta la 1.4.0beta19, permiten a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo PNG con fragmentos desconocidos de longitud cero, lo que dispara un acceso de memoria no inicializada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF9C3AB-DE2A-485E-A7C6-442B239447B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F3EAC4-FB4B-429B-8C9E-EA19C970B712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:e:*:*:*:*:*:*\",\"matchCriteriaId\":\"01B1755E-1F7A-4E8D-9726-63DC4FC4029A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:f:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4648C1A-13C1-4082-AFC1-EE9B7EBC401C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:g:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF340285-5195-445C-ADB2-F1EF2FF901CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:h:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64DD9BF-26E3-4BEE-BFE0-FFD523600CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:i:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0C5F5B-96E1-41F5-A233-487A929B2590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:j:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0CCEEC-A625-4BF8-8696-BF6260AD8445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2DF0E03-3EC6-400A-9AF6-B653053C17D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"5216F808-88C7-4E1A-9FCE-C8DE5680AAB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta13:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C6D2E3-1617-4530-845D-40188526D238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E17E296-E69C-48C7-9B7F-FC85BCB7FF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F3EFF1-08E9-42C0-ACC9-55A22BDEE978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D10792-38F4-488F-9E08-15FF15A9A3BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta17:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9ED9B2-D9D4-4200-B387-21A893453E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:beta18:*:*:*:*:*:*\",\"matchCriteriaId\":\"3983C9FC-7546-41BE-8E22-B3471DF9F3AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFAB3DFB-58B7-4713-B88B-26424D639B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2131F2BB-80E3-46A0-A0D8-4450C625A525\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C686308E-1A71-40E5-BCDE-5144217D41A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F37F93-8BE1-4716-B35D-1CB2629867A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4127BB-2A91-4243-B3ED-10D945B6995A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09AAB1F-14FB-42E9-8983-30D2164EA0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50190A04-5CF2-400E-BAE4-9C7F177ECFE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB264E6-1640-459C-8DD0-C9D72124F125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6E3454-14E2-43C8-8E71-1E800FCBE9D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA610E96-CE50-46B0-B695-F4A5FA77AB73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"30459EAB-E65B-4487-A90F-389477F0BA56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89FFA90-6AB5-4587-8F40-E7001E4DD470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2FDACC8-7BFD-477E-A79A-C933CB5C8EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9139F742-A946-4D2F-9C14-95216C06ED4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DBCDA70-BB1B-4408-A2F3-ADB7A7B77A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4D368C-C167-4CF3-9013-FFC297D1D977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3571DD2-5200-48AE-83C9-B1DFF3A1FEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"782DFA55-BB92-41CD-A4DF-D986C387EB8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2601CCF9-3A89-4EEF-9941-894AEAF89F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE11FC5-8A49-434E-B828-AE7C011B03CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"265EC12C-6239-4367-9769-73AC999556F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA772E3-B022-4F5E-8D43-C0BE64F187D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6589696-904B-4F7B-84F7-0E8D2F0ACFA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5CF8EED-F09B-4AB8-A0F1-1F8DBB5385BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3909436-175A-4DC7-956F-C0905DA579FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086C6335-7872-46A7-AEB1-9BE5AE5A788C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.12:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0532A8-3F66-49D3-95BF-2E78DB6EC471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED11C9F-4E2D-4364-AEEC-43E61531BA9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8233B1-04A0-4E25-97EE-CF466B48A12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA714E7E-05EF-4598-9324-887BC66C675E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CF3B73-D3B9-4D76-B411-C837BCE0806E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC7C52B-0D8D-4509-B9B5-B12E54EA3A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0514ED-C8F8-4F15-A40F-04D643F3DB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77DCDC0-29DD-4BC8-BE30-3A348963F821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1752D91-3468-4E22-B60F-6789B3CBD7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93E210A7-489B-4EA7-A840-599523157DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B37565FA-72F5-4063-8D7A-97BC269F020B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"434AED09-680D-43BC-B9CA-E78028035CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"009AF32A-19B9-4E56-B5D2-2D19082EF102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2643AA61-AB01-4252-8E50-81D5C74F8707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02552E07-D9C8-4DF8-AD63-B3A7B5C2C2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8FA821-818E-4BC7-834B-94EB5C042390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FBF3D3-95A6-4869-8A69-F0E5ECA40220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.21:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"425B207B-D11B-468B-A2C6-BDF276AE4264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.21:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B0055B-D0F1-4D8C-AE96-06315FFCC602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07785D0-E995-4208-AB8C-43B320D291F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42AC8B9-BEB2-4495-8A42-2AEDB29A3DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C2D14E-FD1C-430A-AC08-D61F997D8BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B34C747-1D67-458A-B9D1-FA61954F7067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E618FC-38AA-477A-8F8E-BC5BFB0713C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0149BCA7-DCFC-449B-8AD5-DC6F9BBC80B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D2BD41-12CE-47F1-ABD5-BE7AFFABF96B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BBA666-4473-4C6D-BF48-34EF3F09AD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.24:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"75767F08-B52A-412D-ADA8-1E23777DA2DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.25:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"854C857C-762D-400D-AFB6-3353558D0D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.25:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB239211-BF7F-4357-B19F-221147CFC37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2763A6C7-DBBA-4E2A-917C-B6FF524B9891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D357DF0B-E6CB-4E24-9AE3-6A2C9A422AF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C5BFEAD-9028-4F69-AB72-6004B0885A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9277C1BB-81B7-4971-B68B-20672AEC1644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"588913EA-69A8-4053-9181-37FB0E8DA273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D20090-A8E7-47D8-AD67-327B01315BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"896D47F2-4F84-4F32-9F94-90F9B5F36BE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DECDF8-7742-4D58-99FA-100A01748B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"01590CB5-4BAA-43CC-802F-3486EAD52BCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DEAD5D0-7D13-4B46-AC43-3F0A5291A53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E0E86E-3932-4EE2-B34C-D5861FD16187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6435C47-5DC0-4EB6-984D-9231EB334AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DF231E5-CD60-4D4D-9A08-443C8CA500F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4FD3B1-3A68-4122-AA50-31BFC6C50408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"828BE0B5-8DF7-4C29-B55B-6AA01FBFD004\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B654AFC2-0A1D-477F-A922-B235B9EF83D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"100CCE68-F893-441B-ABF4-DAF968BD623C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E393C0-85F8-49E4-929C-A390E0F3D884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45790331-CE26-457F-8649-F027703E73EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.30:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A840A036-BBE0-4DAC-A7D9-11A3C48FC131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0BFE2D-5C7B-42E0-B783-8C5907CA8635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.31:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D366AD3-5FC2-4B75-8002-D966DC337261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD993C1-70B6-4ACB-B958-94E7EF973A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F008946C-43E9-4ECD-AE9F-486A4686AE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4D6BB0-8E1A-49A4-BBC9-CBFA252C92A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE1DB59-0A60-432B-9D88-906C4FE6D6B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C111BDD4-2A52-4FB7-8D21-6049A10BCDA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B33807C-8E7B-4A04-BE92-59C1B845AD42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1614466-8EAC-4404-A674-EFFE0FFFBDC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2D5068-5BF3-425C-8B1A-E12E3D3CD8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4F7833-4F88-4C54-AEC7-3C4FB797AE38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A973ED-CA5B-4A18-ACAB-1542E3866896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA737702-6335-42F9-99B9-856D531B70F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EAD9719-2736-40AE-BBEB-8BA627E8DF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"62693E5F-2EF6-49B5-9946-42CE61F4ACFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ACA253-BDE7-4CAE-8F74-71EBA4728358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C776F58-A76E-4ED3-825B-52ADFB38D0E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF62B46E-37C4-426A-8854-E961BEB543E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EDDB54-70C6-41D0-AC5C-C10F8D107964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEAB037-F146-444F-A867-D08BD48DA6F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"4962A86F-C9F5-4F03-AFCD-D2E6FD08BD06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47CF2A43-2D15-4D70-A424-C12053D1A6A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF8999B-86FF-4EC2-8EF3-C7461A6EBF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79E13B4-A826-47E9-BE30-E5D9864E8681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6577A0A-B689-424E-BAAE-BD5DF2615311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA7418E-2F52-4F24-8722-8CA9781943F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BABFD5AE-95DD-478E-8E55-1541C4EF3D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"511E1319-C882-4761-ACD5-84617B78578E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A6EDED-CB33-4C80-B9C0-9774CC1455B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB4A1D0-2360-4191-AE7C-0B1B4E0FB34B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D252442-7A38-4AD7-9CEA-DD5B090726DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"203E0B7E-7ED5-4F89-8E12-BDA590DC7DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DCD92E-792F-4A6F-AF83-1B04E3B9F62E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CEEB5-1CE9-4818-A299-77516A26F30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4DD7CF-90BD-4DD3-9E1A-7D2F527CAC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA5FE79-5C4C-47E5-9DF2-CEF37F139389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A434DDF7-A9D4-42AE-8A92-41E45C42B683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1608ABE4-8EE7-4280-B8E0-D4518BA1D706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AECC80A-1D17-4BFD-92D6-6CFBAF88BEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29E6D8C-3691-4451-AB5F-48574C98A551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C90D1A-B862-4B43-B5BB-67DE455DFC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C56374A-0D57-4545-B538-20964F392996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"08722144-6645-4321-8340-6E68DF1AFE99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C30D261-CBE2-4E3A-9ED0-9D2DFB04D465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"665B34A9-4331-4FC4-BB78-D6EE89827D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9D5E28-E8E0-47F6-8728-18F2DDE0DCCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"093976B1-BC7C-4671-B4B1-0FB94D0F699A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C248EEB8-1510-40A4-B37B-E8F9AAE8687C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C96068-1E81-430D-9C5F-A4273CA0BBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"243E4DB3-2553-48E9-9DA2-8AF955389EC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85CE44F-46D0-46F4-B4AB-271A9BC271EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2716FBF4-5BDB-4D76-AC79-AB9158DA1241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFD6B80F-7574-4A9F-AC40-7E357EE3F50F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"244D10AC-1C34-4D18-AB06-F9C2C9F564BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DBEEA4A-8175-4E06-8346-93541868A6BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3CC9D97-1C0F-4A48-9F2A-A74960A84D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A692466A-6258-4D90-B362-9797B03CDB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE92591-5AD8-47D0-BDDE-350C2BFB5736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E6F6A5-0844-4625-8AA4-E1CA8E15C1DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"786B4160-C9E9-4EDD-83D9-741576FDDF2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"039D87A3-49FA-4C02-B137-42D4407DD4A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEEA0BB0-24E2-4D13-ACD6-BC4DD7878AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7981F07-C65C-4AA8-8653-786FD6A50BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE280017-8064-416B-AFA2-3DC8D2B1331B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA584B09-52A3-4D87-8B72-B704069766E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10C7AE8-85C0-4CD1-910B-320FE52AD542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"6763A6C3-53E3-41AF-B5DF-4ACDC5371AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"1693150F-E485-47D9-A957-C0A8FEFC8844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F08FBEB-3FA9-4C57-9CD7-717C41F352C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E83B68F-B0E2-4C37-A711-1714652AB961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F17A4B7-99C2-407A-9536-4B54EDC02899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F854F244-78C9-46C6-8862-1DA58912FCE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4C883A-A2A3-4D5F-8114-CE9220FFF7B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3544F0FF-3EEE-4902-B412-EB57D6AE7A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F428FF4-21A8-4605-AFCD-E78F43E46AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"7132AA21-DC2F-4493-9BCC-27E3D8F075AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B65F8362-934F-452D-8E86-0DB2E3C7B43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"934D0AB5-62FB-4EC1-971A-A1BA8EEAD008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5891F237-D1DB-4CCE-8A8B-D10E7EDCB926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E114E18D-2882-4843-9356-279C69ABCBA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E271694-B8C8-4BCF-8B4A-0425BA50EF6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36CC085-34FF-4B84-8628-74BEEC686C88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"06793BE6-3370-4FCB-A400-C6AF95D1E66D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE742D36-3A33-4316-8326-FA2F1B228E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D0C5E1-4D8D-42EE-8C94-12D442181DCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3326F984-8312-4E7F-A269-0A06FAC8BE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"290CF6FC-3BD6-4974-9DEC-188B79DC816A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"782ABB64-C2F2-4326-A69F-75E514055C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF9CEE2-8DB6-480F-970C-E19FEF31D0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"28C13A65-C0D6-4904-8C92-E5233D7E5CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38993FC7-12DD-4D75-8EC6-719C0AD66191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CAF82B9-020B-48FD-BE3D-70B8A7A8CDA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C43481DF-59C5-4E9B-8CB9-49E4873B7263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFC71CB-0B01-4A34-85B8-8A27C1E7D451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC53C1C7-ED9C-44C2-B446-0426E4C92D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B996835E-97DB-47B1-80B9-BE757680CAFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC7256E6-502A-47A5-A692-90162AA40AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"53E7BDBC-5BF8-4BA3-959D-1D16ACD558D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B6B4A0-9B7E-4835-9F82-2B1D1AF955AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BBC74C-51A3-48BB-B867-3A5F58AD8B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DEDAB32-9D5C-4F12-B9E4-ABEA615DC11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DA5585-140C-4F27-8654-BCFCB12659B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA8F6085-9769-44DE-8E43-FAB7C7791A77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4D700F-AA36-4A5B-8BD3-3BD9A452D743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6045135-54AF-4B83-9279-47BB1DB67172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB7D1F1-7959-4459-827C-90B193F58269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A6F2F0-E088-458F-813F-5B45EA01B77F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"96308F2E-E2DE-4C0F-B0A6-7FDFFF67A0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A21785C-989F-4E72-932B-E77892EF492A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D832C4A-0793-4B64-944D-086CF614CAEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8E2232-7077-4CE4-9141-80F2F744F0B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CDA418-F580-4625-9D84-F01EA5D0FC5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FB8DC5-ABD5-41BE-99EC-E610504D6F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B41406-956A-48C9-9CDA-D7257D19E6F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"B100CFD4-788C-44BF-A55D-225F72314A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6BFCBC-F3E9-4CDD-833F-01D51594B0F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"589DC20E-E642-4BC7-83CD-01323D7F6236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A9B81C1-EAF8-44B6-A4FD-2568FFBB6FEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EBF19B-7E53-4627-AE87-6B7C4ACD88F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"43744C82-D271-4BF3-9AD8-A48C1B5BA33F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD68995C-816C-4E25-B8B3-0BC808490D73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EDC3AE7-569F-4016-B35E-E8B8B3456959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*\",\"matchCriteriaId\":\"17068432-BFE0-4BE1-A86B-7D6562D18103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F0F2AF-748A-411A-8B95-45A04800FF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"945C0B80-E562-4495-849E-23EE406D2EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E91B287-CDFC-4791-95D5-54AC847877D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F09C15E-E20C-473D-AF13-5509669DA8FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FD7096-C215-4CCA-B0BE-244E9708E947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC8DAFE-64A5-47C6-BE99-093E744181B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*\",\"matchCriteriaId\":\"C075C36D-D191-4165-A2A8-A8BA6AD93862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E9A4DE-C0B7-4951-97D2-26EFFE065A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9FC583-AA79-4ED1-924B-DE58FBB88385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*\",\"matchCriteriaId\":\"727FA534-FB49-4784-A56E-D709071FFEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*\",\"matchCriteriaId\":\"17628553-688B-4574-9B2A-035937225DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96F2F5A-A881-4EDC-965F-43984EA06151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E9442B-FCA7-42A3-9E73-343D9FF11985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EB24053-49FC-488C-8DC4-12F5A485EC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*\",\"matchCriteriaId\":\"653700ED-B2E3-4DD1-99A1-ED0B4504E628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"101240B5-FAC7-4D47-9C4A-840D06E082EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"608088FF-8EED-4F05-96EA-0E23F669C078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"82401AB8-5432-4D75-ADC2-A310132EB9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CECEDABC-F229-43F7-9795-9E87198424D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"712E5798-A0FC-44E7-972A-D2EF66F5C793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"82690AE3-BFFA-4616-AE30-35A6D21DFC1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0082F7-DDD3-4266-B604-D1E2958ABAE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A32AD4-38C7-41BE-8042-9BCED336AA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC96DBDE-15A7-4C63-8C71-AA5CD158E306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"834A6D33-2334-4361-92CE-8AECAF3614CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC3A80A-4C35-419F-B576-40A3FAD37723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FCC174-9216-433D-A5CB-A7C275DD9D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*\",\"matchCriteriaId\":\"01EF52B3-BAD3-4E0C-B19C-3465A036B025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*\",\"matchCriteriaId\":\"1685F3BF-635D-43DD-855D-7666D807AE3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAA8FF97-98D2-425F-935C-36951DFEE029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CEE9078-6B9F-4BA1-A6BE-25743B02FE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE1A8933-9958-458B-A511-D018B7CA7D57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"100BF4B6-2A63-416A-B19F-722A9B44F126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD8FB59-2260-4343-B4D6-279ED7D7D5E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDCE2DE-94B7-460D-8BBB-26ACA4847807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A812C450-8E1F-4667-99EC-7237E1E319E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD94AB7F-B7CF-42B0-AB71-23F42F3F1067\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5460DA6B-6F81-4B8C-9D8F-DB946E3F33EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E92521-FE62-4940-B194-A8482538401B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF7D5B4-A8BD-4F3B-8DB3-D5AB94086A32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A244FC-545E-4041-B922-B1B640E7E371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F8973E-8150-4834-8D9B-370F3664E894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C93F2F-533D-4563-95F2-E94A2CCE9C39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"73045C50-73FE-4162-8E8B-7721131E4396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C89DFAAD-279A-462D-BF72-D75CC24E72E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1879D7C8-ABF1-4ECE-BBC7-71978695D4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B27B3A2-04E1-4261-AA70-30EE2AA934F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA60D3F3-149B-4A76-9F35-4A0A127ADF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D625A71-5F2D-446A-BD69-1470B4127DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C85EF8-8D8A-4ED8-B55B-2182421626CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D65DCF8-D9A6-4A9E-8171-C52E12EB1476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5114A9B-263F-4BBF-9A6A-F6E0900CDD78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD12B3A-27B6-4BD4-90B5-874B677689FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*\",\"matchCriteriaId\":\"27988956-B3F4-428A-B369-C5E01A2F9102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4D45B16-C278-4ABF-8B91-CFA0AB384290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*\",\"matchCriteriaId\":\"247153A0-CF83-4D6E-A657-5D8D217D8EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D03C1D-684A-4BA5-841B-C414AD244DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F89EDB5-A195-479B-BEFB-E0A186A4A9D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BAC6A6-FBE9-48CD-9B4E-FC570684922B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*\",\"matchCriteriaId\":\"E695F515-AE7E-48AB-999C-75B62BEA0BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448D4A5-D827-4FF8-BAC1-E25FD8F01C41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*\",\"matchCriteriaId\":\"935F2297-6CB4-4ABB-9F4D-F11708CDC069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*\",\"matchCriteriaId\":\"25ED23F7-DF30-46B2-99EF-3924E22C1870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB56358-46E4-4999-A311-5E1819A6D5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*\",\"matchCriteriaId\":\"F508CFA5-5602-445C-9E18-71B6A625F9E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*\",\"matchCriteriaId\":\"897D42F6-202B-425A-BF0D-76D1A74D8E67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*\",\"matchCriteriaId\":\"50300181-3691-4EA2-B779-1C9CF59E08FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*\",\"matchCriteriaId\":\"CABA31D9-9EC0-4447-9C5E-8BC5DF5F431D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4568552-91F6-4E05-ADA5-4127CBD4D3EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72D51C0-1044-4A74-823F-7123340FB9BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF7EE024-3E34-4452-A832-751BBC109086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"947395DE-A911-47B3-983D-B5D23672068D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE24B381-8144-43C2-94EE-B5702B7B5EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"794EB3E2-2111-44A9-9980-417613450E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C106DD-69E9-41FE-8642-74A1A6FF1123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C2842-7F1D-4EF4-A2D2-4A3CA2D6D3D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta13:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB29C385-6A32-4857-AF7A-CA609C90C824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta14:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B8C015-7E59-4B05-91E1-EA3EF2B22F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta15:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA68AE1-6C85-4657-BA59-8C03E7C2B748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"76940407-3D93-4528-ADC9-CE98F7C0FA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta17:*:*:*:*:*:*\",\"matchCriteriaId\":\"04433179-590B-448E-8192-5661A95908DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta18:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D3F5172-3B73-4A90-A061-8F831785B6A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC754C3-8B70-48A8-9DB8-9336534633C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF05CA3-1200-4789-B5B3-537F9756F322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2AA4F92-A968-4F4D-AA74-375B425E271A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A1CD34-107B-4B46-87A5-40B93CB3C612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8611DAC7-310F-44BD-B9DD-24C44F50ED62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6CF21B5-43AB-4802-AEE5-944B32BB8AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CA8A77-4558-4822-9F6A-9C11256E1241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"404F62B4-6D97-4075-B127-F9E3905F49A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91A59A4-71BF-4428-8036-E08091FA8663\"}]}]}],\"references\":[{\"url\":\"http://libpng.sourceforge.net/Advisory-1.2.26.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29678\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29792\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29957\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29992\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30009\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30157\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30174\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30402\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30486\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31882\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33137\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/34152\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/34388\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35258\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35302\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35386\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-10.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.541247\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1750\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:156\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/44364\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0333.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/490823/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/491424/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/503912/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/28770\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1019840\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1225/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2584\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1451\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1462\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1560\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41800\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://libpng.sourceforge.net/Advisory-1.2.26.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29678\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29792\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29957\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29992\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-10.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2008\u0026m=slackware-security.541247\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:156\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ocert.org/advisories/ocert-2008-003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/44364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0333.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/490823/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/491424/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/503912/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/28770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1019840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-260A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1225/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/41800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1382\\n\\nThis issue does not affect the version of libpng as shipped with Red Hat Enterprise Linux 3.\\n\\nUpdates for affected versions of Red Hat Enterprise Linux can be found here:\\nhttp://rhn.redhat.com/errata/RHSA-2009-0333.html\",\"lastModified\":\"2009-03-04T00:00:00\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.