Search criteria
6 vulnerabilities found for libpng by redhat
FKIE_CVE-2012-3425
Vulnerability from fkie_nvd - Published: 2012-08-13 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52D5DAA1-3632-48D7-A657-4A4C83A119D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5AE8E0-3C11-4EE1-A599-4D70C6A13F1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD36C3B-3C02-488B-B480-EA091D702CA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "59BAD272-D4B6-40CE-B5E9-63145E12B638",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EEB311C-766D-4070-A0BE-9CE4593C8F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C185BF59-68E4-49F8-802F-C06FE840FF3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C399B31-B8EC-41C4-B6AB-83BABC474374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B00AF5F-D4F5-490C-8BF4-2B33EFBF15A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BA9AEB1D-0AA7-4842-9CF9-91BFD8B58A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "09150152-5DEA-4FA2-9163-63EAF4D83DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C036011A-9AE1-423C-8B73-188B9BA20FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8051459E-94D3-4D4A-9D40-CC9475DDB00C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42056C63-69A7-43CF-828C-0C3E365702D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6A39A3-7F86-4DC3-B248-859630AFB9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58377AE3-1C13-4C3F-BC55-8336DAEEF97F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "005C2DA4-D00E-4206-851E-9226D66B5F2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "97B17602-0D97-469B-A9B1-30AAC8F758F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "857B664A-C6F9-45E3-93EA-C0F53CEF5C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFDA458-74E8-4DEF-B524-A4A8672CB66A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3E3BF3-4376-4692-A515-A7B6593F28F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1AC712-110D-458F-B650-930C6D45CA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7F848FA5-9682-454F-A9DE-671C4401F15F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B83678-98A1-440E-950C-4A27995C7294",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9EEE31-479A-4370-BF00-C26C1AF502B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "95EABD7D-1F18-4FA5-BAA9-F8D69129E531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "65B836CA-3740-48B0-966B-21E65EF3D636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3988FA1B-18D9-46AA-87BA-A6B01D4F4B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "51A46409-7AC6-45DB-B92D-29988C445BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "09E2B608-6C70-446F-A3A7-369048D99855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA00AE0-F447-4361-AA37-0C98BDE491E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "220A02AF-6ADA-4B75-BC81-40B2D847029A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEB8F61-195E-41DE-90CE-22854055E9D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "111091B9-CBAE-4FC7-8B97-7D2345BFCB45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "54C6D9D3-50B2-4A63-B3D1-C76C70F4443E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "4110AA74-C69D-45BC-A630-9EE3A2036BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "1CAA1090-C1C7-43A2-BD44-065572D226B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2FD92305-91BF-4984-A029-8FA83CBF1A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "31EE280F-D76D-478B-ADD6-D5F2C7574A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "747314F7-A515-41FF-8095-62A9F05F0DEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "C1BE9ED0-685B-41F0-A984-D33E7034AEA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F6AD99-7697-47E5-8301-723C16535C76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*",
"matchCriteriaId": "07B00AD3-D13C-45B5-A13A-9092D40F4A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*",
"matchCriteriaId": "14222EA8-E8ED-4818-ACB4-C6A13643F210",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*",
"matchCriteriaId": "A22C28DD-5C99-4722-9093-A1E82A2C2808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "93714B71-6331-4F5A-A12A-B4B80CA2FEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "10CD562E-1F06-4779-A29C-4069E3C86B16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "4D83D507-64AF-4158-97B9-1353E2F8EE46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "BC5E39EA-C32E-4E87-9A3F-CCB5144F0E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*",
"matchCriteriaId": "61B9103F-CD72-4F06-BED1-7AE4AB9E672C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF6249D-5AA8-4EA3-A92A-0E492FE5B811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE7F259-40A2-4866-8EF8-44A9913EC4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*",
"matchCriteriaId": "CFA3EED5-F0AB-4C5C-92D7-B84BFDAA31AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*",
"matchCriteriaId": "03C20A42-6A77-43D4-80D7-332BB2DF1B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*",
"matchCriteriaId": "8A0A1B56-0E92-4E81-9B2C-4F9B9D5833EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CC5DBB-249B-4EED-9F54-E23CB1919ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*",
"matchCriteriaId": "C10D9119-0FF8-4DFE-8632-A14D9C83CC9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*",
"matchCriteriaId": "C24CA735-6EA6-41E3-A82D-D443BB47806B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*",
"matchCriteriaId": "4826B607-8DAB-44A4-B4FF-4BBFF9A05487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*",
"matchCriteriaId": "3701107A-C208-426B-9EA0-CD1794D0EDA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "C8BA2974-AF9F-4382-B443-F54354B5623A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8BC209-45B9-44D6-A26D-0B570ED5BB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "468B1A0E-AF58-42C4-9801-D6F83F283360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6644ED2F-66F3-469D-8233-72FE7321E850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "B36D610D-F86A-4D46-B0F2-884FFA601C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "C8A976DD-87FA-425D-8E07-E3CFC4D3FD05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3F34978D-6ABE-463E-AB48-21CC55B7D157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "3716FF0E-AD20-46F8-B8F6-3EC42D427C90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4568BB-F5FF-4BBB-9DA3-E66C2BFA2416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "E5300EC4-B3A0-42C5-8D39-67AB75C47153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "246CF13F-FDC1-499E-9FC1-5624D54E9E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "D5840A8E-AB64-40A9-8BB6-EB6BA51D40B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AC66FD43-421B-4223-BA32-EC47B51E1091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*",
"matchCriteriaId": "EEC9D57C-47F2-4773-85B6-FFB0C4681E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F5664B-5AB9-4DE4-99AA-8FD32DBA4A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*",
"matchCriteriaId": "5CD1C8E6-DF35-47F7-877F-001AD62B57CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7712376-D776-4814-A041-FBFEAC70ADC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "DF69B34E-F7FB-4F4C-AF7D-ACD165B1233B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*",
"matchCriteriaId": "F7CC2E64-E48C-4DE6-892D-06A0B806A51B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29050958-EFD8-4A79-9022-EF72AAD4EDB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CB33B1-71B2-4235-A2C1-FCAEA9844A6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "436F8C71-1780-4DC6-937B-8F1F51C7453D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B79DC5F-5062-4031-BA11-746EE3C8E1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "35F2B503-1516-465D-A558-9932BDB3457D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BA94EAAA-A4D2-4E36-BC69-BBE9644FE970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A7C96C-8FBB-42B4-937E-3321C939CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "94084356-D39B-41B2-AC24-0ADAD0BF5988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "086C6335-7872-46A7-AEB1-9BE5AE5A788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FF8233B1-04A0-4E25-97EE-CF466B48A12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FA714E7E-05EF-4598-9324-887BC66C675E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C5CF3B73-D3B9-4D76-B411-C837BCE0806E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D1752D91-3468-4E22-B60F-6789B3CBD7B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "93E210A7-489B-4EA7-A840-599523157DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "B37565FA-72F5-4063-8D7A-97BC269F020B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8FA821-818E-4BC7-834B-94EB5C042390",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FBF3D3-95A6-4869-8A69-F0E5ECA40220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "D07785D0-E995-4208-AB8C-43B320D291F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "19BBA666-4473-4C6D-BF48-34EF3F09AD7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "2763A6C7-DBBA-4E2A-917C-B6FF524B9891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DECDF8-7742-4D58-99FA-100A01748B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4FD3B1-3A68-4122-AA50-31BFC6C50408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "45790331-CE26-457F-8649-F027703E73EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0BFE2D-5C7B-42E0-B783-8C5907CA8635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD993C1-70B6-4ACB-B958-94E7EF973A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "C085686C-A0AA-4F56-9E7D-B5CB24B890D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "D02A5197-06B9-469E-9817-45BB23324042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB6BE37-E564-4E42-BE39-36DD301C37A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "314209F2-E0A0-4045-8108-8E7215312442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "11A8ECBB-7E50-4447-88E2-893C1466C251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "8B8F24A5-F5C3-495F-9AF0-2EE836E0147A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "46DE2DE3-F081-4B80-A4DA-C5AB27B3CA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "71EF1D77-7838-47DF-B6A2-DBBAC0058FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "76BA4FEA-FEB4-47A9-9DFF-A233CEE03D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "60DB5A63-E89E-48AB-A846-107EBEC71D67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "2181FEEB-D07E-490C-9953-3490D87B63A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "36DC41DD-A291-4ECE-84B9-574828AA2A80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "015D1E36-17A1-4413-B1FB-5DF4C36712BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*",
"matchCriteriaId": "F64CE8F2-22B1-43F8-8934-CBCD2EFBA85D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "CEB15BE8-1B88-4117-AF14-3AA2B54DB323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "A2CB2728-4CC7-46EA-809B-450A9BB9F884",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "96638963-D264-49AD-9B77-497C3DA23DFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "88544BBE-29A1-4622-B3E6-FA4B891A9B5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*",
"matchCriteriaId": "DD658D98-9A4D-4DC2-A935-BB3BF0E0FB2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF819AF-AC11-4BD9-A070-572836A65FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEAC62D-BF2B-40DF-9428-FFBF7CA09471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*",
"matchCriteriaId": "27DFAB04-5C5C-4366-B3FC-C83AAB807F0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "36327723-F953-4BD3-A525-930DDCF7931D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*",
"matchCriteriaId": "36F717B1-CC02-4878-9A78-1584074E81C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "7D482811-2EF1-47AE-A41C-7532AC6DEF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*",
"matchCriteriaId": "FF26AB67-81F8-4CD2-8E28-BDF9FE2CD58F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image."
},
{
"lang": "es",
"value": "La funci\u00f3n png_push_read_zTXt en pngpread.c en libpng v1.0.x antes de v1.0.58, v1.2.x antes de v1.2.48, v1.4.x antes de v1.4.10 y v1.5.x antes de v1.5.10 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (lectura fuera de l\u00edmites) a trav\u00e9s de un valor demasiado grande en el campo avail_in en una imagen PNG.\r\n"
}
],
"id": "CVE-2012-3425",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2012-08-13T20:55:09.207",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"source": "secalert@redhat.com",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"source": "secalert@redhat.com",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"source": "secalert@redhat.com",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"source": "secalert@redhat.com",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-0421
Vulnerability from fkie_nvd - Published: 2004-08-18 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| libpng | libpng | 1.0.0 | |
| libpng | libpng | 1.0.5 | |
| libpng | libpng | 1.0.6 | |
| libpng | libpng | 1.0.7 | |
| libpng | libpng | 1.0.8 | |
| libpng | libpng | 1.0.9 | |
| libpng | libpng | 1.0.10 | |
| libpng | libpng | 1.0.11 | |
| libpng | libpng | 1.0.12 | |
| libpng | libpng | 1.0.13 | |
| libpng | libpng | 1.0.14 | |
| libpng | libpng | 1.2.0 | |
| libpng | libpng | 1.2.1 | |
| libpng | libpng | 1.2.2 | |
| libpng | libpng | 1.2.3 | |
| libpng | libpng | 1.2.4 | |
| libpng | libpng | 1.2.5 | |
| openpkg | openpkg | 1.3 | |
| openpkg | openpkg | 2.0 | |
| redhat | libpng | 1.2.2-16 | |
| redhat | libpng | 1.2.2-20 | |
| redhat | enterprise_linux | 2.1 | |
| redhat | enterprise_linux | 3.0 | |
| redhat | enterprise_linux_desktop | 3.0 | |
| trustix | secure_linux | 2.0 | |
| trustix | secure_linux | 2.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B79DC5F-5062-4031-BA11-746EE3C8E1CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "35F2B503-1516-465D-A558-9932BDB3457D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BA94EAAA-A4D2-4E36-BC69-BBE9644FE970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A7C96C-8FBB-42B4-937E-3321C939CC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "94084356-D39B-41B2-AC24-0ADAD0BF5988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "086C6335-7872-46A7-AEB1-9BE5AE5A788C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FF8233B1-04A0-4E25-97EE-CF466B48A12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FA714E7E-05EF-4598-9324-887BC66C675E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C036011A-9AE1-423C-8B73-188B9BA20FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8051459E-94D3-4D4A-9D40-CC9475DDB00C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42056C63-69A7-43CF-828C-0C3E365702D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6A39A3-7F86-4DC3-B248-859630AFB9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58377AE3-1C13-4C3F-BC55-8336DAEEF97F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46B96764-9241-4586-9FA5-77D8D8EBE3BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48A4B336-2D5B-4D9B-AA87-E5266FED05BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*",
"matchCriteriaId": "4826B607-8DAB-44A4-B4FF-4BBFF9A05487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*",
"matchCriteriaId": "3701107A-C208-426B-9EA0-CD1794D0EDA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A423B773-6B8B-4BA3-80A1-C8CAEF4D9BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message."
},
{
"lang": "es",
"value": "La librer\u00eda de Graficos de Red Portables (libpng) 1.0.15 y anteriores permiten a atacantes causar una denegaci\u00f3n de servicio (ca\u00edda) mediante un fichero de imagen PNG que dispara un error que causa un lectura fuera de l\u00edmites cuando se crea el mensaje de error."
}
],
"id": "CVE-2004-0421",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-08-18T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/22957"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/22958"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/22957"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/22958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-3425 (GCVE-0-2012-3425)
Vulnerability from cvelistv5 – Published: 2012-08-13 20:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:05:12.386Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-11-24T19:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3425",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=73e2ffd6a1471f2144d0ce7165d7323cb109f10f;hb=refs/heads/libpng15",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=73e2ffd6a1471f2144d0ce7165d7323cb109f10f;hb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=2da5a7a8b690e257f94353b5b49d493cdc385322;hb=refs/heads/libpng14",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=2da5a7a8b690e257f94353b5b49d493cdc385322;hb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=284de253b1561b976291ba7405acd71ae71ff597;hb=refs/heads/libpng10",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=284de253b1561b976291ba7405acd71ae71ff597;hb=refs/heads/libpng10"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;hb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;hb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-3425",
"datePublished": "2012-08-13T20:00:00",
"dateReserved": "2012-06-14T00:00:00",
"dateUpdated": "2024-08-06T20:05:12.386Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-0421 (GCVE-0-2004-0421)
Vulnerability from cvelistv5 – Published: 2004-05-05 04:00 – Updated: 2024-08-08 00:17
VLAI?
Summary
The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:17:14.971Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2004-106",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22957"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2004-106",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22957"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-0421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2004-106",
"refsource": "FEDORA",
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"refsource": "FEDORA",
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"refsource": "TRUSTIX",
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22957"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-0421",
"datePublished": "2004-05-05T04:00:00",
"dateReserved": "2004-04-19T00:00:00",
"dateUpdated": "2024-08-08T00:17:14.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-3425 (GCVE-0-2012-3425)
Vulnerability from nvd – Published: 2012-08-13 20:00 – Updated: 2024-08-06 20:05
VLAI?
Summary
The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T20:05:12.386Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-11-24T19:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-3425",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20120724 CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/3"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=73e2ffd6a1471f2144d0ce7165d7323cb109f10f;hb=refs/heads/libpng15",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=73e2ffd6a1471f2144d0ce7165d7323cb109f10f;hb=refs/heads/libpng15"
},
{
"name": "[oss-security] 20120724 Re: CVE Request: libpng: Out-of heap-based buffer read by inflating certain PNG images",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/07/24/5"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=2da5a7a8b690e257f94353b5b49d493cdc385322;hb=refs/heads/libpng14",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=2da5a7a8b690e257f94353b5b49d493cdc385322;hb=refs/heads/libpng14"
},
{
"name": "openSUSE-SU-2012:0934",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=284de253b1561b976291ba7405acd71ae71ff597;hb=refs/heads/libpng10",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;h=284de253b1561b976291ba7405acd71ae71ff597;hb=refs/heads/libpng10"
},
{
"name": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;hb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8",
"refsource": "MISC",
"url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=blob;f=CHANGES;hb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8"
},
{
"name": "USN-2815-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2815-1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-3425",
"datePublished": "2012-08-13T20:00:00",
"dateReserved": "2012-06-14T00:00:00",
"dateUpdated": "2024-08-06T20:05:12.386Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-0421 (GCVE-0-2004-0421)
Vulnerability from nvd – Published: 2004-05-05 04:00 – Updated: 2024-08-08 00:17
VLAI?
Summary
The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:17:14.971Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2004-106",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22957"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2004-106",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22957"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-0421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2004-106",
"refsource": "FEDORA",
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451353608968\u0026w=2"
},
{
"name": "20040429 [OpenPKG-SA-2004.017] OpenPKG Security Advisory (png)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=108334922320309\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:971",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971"
},
{
"name": "DSA-498",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2004/dsa-498"
},
{
"name": "oval:org.mitre.oval:def:11710",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710"
},
{
"name": "MDKSA-2004:040",
"refsource": "MANDRAKE",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040"
},
{
"name": "22958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22958"
},
{
"name": "libpng-png-dos(16022)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022"
},
{
"name": "APPLE-SA-2004-09-09",
"refsource": "APPLE",
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html"
},
{
"name": "10244",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10244"
},
{
"name": "FEDORA-2004-105",
"refsource": "FEDORA",
"url": "http://marc.info/?l=fedora-announce-list\u0026m=108451350029261\u0026w=2"
},
{
"name": "MDKSA-2006:213",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213"
},
{
"name": "RHSA-2004:180",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html"
},
{
"name": "MDKSA-2006:212",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212"
},
{
"name": "2004-0025",
"refsource": "TRUSTIX",
"url": "http://marc.info/?l=bugtraq\u0026m=108335030208523\u0026w=2"
},
{
"name": "RHSA-2004:181",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html"
},
{
"name": "22957",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22957"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-0421",
"datePublished": "2004-05-05T04:00:00",
"dateReserved": "2004-04-19T00:00:00",
"dateUpdated": "2024-08-08T00:17:14.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}