Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-0973 (GCVE-0-2015-0973)
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T04:26:11.624Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "APPLE-SA-2016-03-21-5", tags: [ "vendor-advisory", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/HT206167", }, { name: "[png-mng-announce] 20141222 libpng-1.5.21 and 1.6.16 are available", tags: [ "mailing-list", "x_transferred", ], url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { name: "[oss-security] 20150109 Re: CVE Request: libpng 1.6.15 Heap Overflow", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { tags: [ "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "[oss-security] 20150110 Re: CVE Request: libpng 1.6.15 Heap Overflow", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { name: "62725", tags: [ "third-party-advisory", "x_transferred", ], url: "http://secunia.com/advisories/62725", }, { tags: [ "x_transferred", ], url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240719-0005/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-18T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-19T13:06:22.903265", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "APPLE-SA-2016-03-21-5", tags: [ "vendor-advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { url: "https://support.apple.com/HT206167", }, { name: "[png-mng-announce] 20141222 libpng-1.5.21 and 1.6.16 are available", tags: [ "mailing-list", ], url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { name: "[oss-security] 20150109 Re: CVE Request: libpng 1.6.15 Heap Overflow", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "[oss-security] 20150110 Re: CVE Request: libpng 1.6.15 Heap Overflow", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { name: "62725", tags: [ "third-party-advisory", ], url: "http://secunia.com/advisories/62725", }, { url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { url: "https://security.netapp.com/advisory/ntap-20240719-0005/", }, ], }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2015-0973", datePublished: "2015-01-18T18:00:00", dateReserved: "2015-01-10T00:00:00", dateUpdated: "2024-08-06T04:26:11.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1C288F-326B-497B-B26C-D26E01262DDB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.5.20\", \"matchCriteriaId\": \"83D384F2-90CA-4A6A-82C0-95F572099E78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7A0D174-F35C-488B-8577-00EFB7741089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"051989A3-3F72-4223-98DF-54B0488656F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EDC5DA5-F2A7-4819-BB9D-258EB9AB7857\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"02FCC235-9564-4B92-B1AB-294EAB110E95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B34D78-C0BC-45DC-AD84-F5F13451ED7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"40C344C8-812C-4EDE-9AD6-31EF7F0E24C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D3A7EC-774C-423F-BDE1-CDCB9433D87B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9353E66-56D2-4CD1-BC30-5B2FF0F4E722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B898B95-CF41-4813-8FE7-776BD59A6A9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9BF9ED-965A-4BF5-A3EC-FAFCE880F14A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5E5899-5A3F-49A1-B18C-4C97566B87BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7897EEC-DE43-485A-B2CD-E8623A6D2C8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACC16FE2-E94E-45B9-94F0-B6434B21DD2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"278434CA-DD56-47FC-9C15-4B9D4159786C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C8DAE31-CCA9-450D-90E5-B8F0490FB944\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C5712AB-1A98-45DB-8384-5CD70D03684C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FEB5C9-0C13-4FD6-876C-AAE7ED4E986C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2903D2B-A99A-4120-88DC-A1DF59085F59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2337F9F3-D26D-4A24-880A-800CD5C16795\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.10:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"D97CC2D1-657A-48D7-8035-89986341B56C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31F71BA3-5402-448E-9068-EB0DCA1D62EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.11:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"3539DE6A-05BE-47EB-A89F-D3E4D98FC014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.12:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A004603-261B-49DB-B15B-A8EE0F3AB4BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD67323A-8463-4B8F-B370-40C2ACFF4D8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.13:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"6944746B-2032-4088-A7EB-EE004F12274E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BBA4F43-0FD0-4D7D-84A0-37C8E79B9B29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.14:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC27CC2-D64C-4AED-A0DF-F6F2920D7AB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71E01CC8-1C29-4C46-8213-B48A2364CE8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.6.15:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A8396AB-D983-4F04-A9F5-FA120A0E0AF6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10.11.3\", \"matchCriteriaId\": \"D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de buffer en la funci\\u00f3n png_read_IDAT_data en pngrutil.c en libpng anterior a 1.5.21 y 1.6.x anterior a 1.6.16 permite a atacantes dependientes de contexto ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de datos IDAT con una anchura grande, una vulnerabilidad diferente a CVE-2014-9495.\"}]", id: "CVE-2015-0973", lastModified: "2024-11-21T02:24:03.720", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2015-01-18T18:59:03.020", references: "[{\"url\": \"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62725\", \"source\": \"cret@cert.org\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/p/png-mng/mailman/message/33173461/\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt\", \"source\": \"cret@cert.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/01/10/1\", \"source\": \"cret@cert.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/01/10/3\", \"source\": \"cret@cert.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240719-0005/\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://support.apple.com/HT206167\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62725\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}, {\"url\": \"http://sourceforge.net/p/png-mng/mailman/message/33173461/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/01/10/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/01/10/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240719-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/HT206167\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", sourceIdentifier: "cret@cert.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2015-0973\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2015-01-18T18:59:03.020\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en la función png_read_IDAT_data en pngrutil.c en libpng anterior a 1.5.21 y 1.6.x anterior a 1.6.16 permite a atacantes dependientes de contexto ejecutar código arbitrario a través de datos IDAT con una anchura grande, una vulnerabilidad diferente a CVE-2014-9495.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1C288F-326B-497B-B26C-D26E01262DDB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.20\",\"matchCriteriaId\":\"83D384F2-90CA-4A6A-82C0-95F572099E78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A0D174-F35C-488B-8577-00EFB7741089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"051989A3-3F72-4223-98DF-54B0488656F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDC5DA5-F2A7-4819-BB9D-258EB9AB7857\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FCC235-9564-4B92-B1AB-294EAB110E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B34D78-C0BC-45DC-AD84-F5F13451ED7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C344C8-812C-4EDE-9AD6-31EF7F0E24C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D3A7EC-774C-423F-BDE1-CDCB9433D87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9353E66-56D2-4CD1-BC30-5B2FF0F4E722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B898B95-CF41-4813-8FE7-776BD59A6A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9BF9ED-965A-4BF5-A3EC-FAFCE880F14A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5E5899-5A3F-49A1-B18C-4C97566B87BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7897EEC-DE43-485A-B2CD-E8623A6D2C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC16FE2-E94E-45B9-94F0-B6434B21DD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"278434CA-DD56-47FC-9C15-4B9D4159786C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8DAE31-CCA9-450D-90E5-B8F0490FB944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5712AB-1A98-45DB-8384-5CD70D03684C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FEB5C9-0C13-4FD6-876C-AAE7ED4E986C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2903D2B-A99A-4120-88DC-A1DF59085F59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2337F9F3-D26D-4A24-880A-800CD5C16795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.10:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97CC2D1-657A-48D7-8035-89986341B56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F71BA3-5402-448E-9068-EB0DCA1D62EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.11:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"3539DE6A-05BE-47EB-A89F-D3E4D98FC014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.12:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A004603-261B-49DB-B15B-A8EE0F3AB4BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD67323A-8463-4B8F-B370-40C2ACFF4D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.13:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"6944746B-2032-4088-A7EB-EE004F12274E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBA4F43-0FD0-4D7D-84A0-37C8E79B9B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.14:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC27CC2-D64C-4AED-A0DF-F6F2920D7AB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E01CC8-1C29-4C46-8213-B48A2364CE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.6.15:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8396AB-D983-4F04-A9F5-FA120A0E0AF6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.11.3\",\"matchCriteriaId\":\"D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/62725\",\"source\":\"cret@cert.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/p/png-mng/mailman/message/33173461/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/10/1\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/10/3\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240719-0005/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://support.apple.com/HT206167\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/62725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/p/png-mng/mailman/message/33173461/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/01/10/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240719-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT206167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
opensuse-su-2024:10184-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libpng12-0-1.2.56-1.5 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libpng12-0-1.2.56-1.5 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10184", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10184-1.json", }, { category: "self", summary: "SUSE CVE CVE-2010-1205 page", url: "https://www.suse.com/security/cve/CVE-2010-1205/", }, { category: "self", summary: "SUSE CVE CVE-2011-2501 page", url: "https://www.suse.com/security/cve/CVE-2011-2501/", }, { category: "self", summary: "SUSE CVE CVE-2011-3026 page", url: "https://www.suse.com/security/cve/CVE-2011-3026/", }, { category: "self", summary: "SUSE CVE CVE-2011-3045 page", url: "https://www.suse.com/security/cve/CVE-2011-3045/", }, { category: "self", summary: "SUSE CVE CVE-2011-3048 page", url: "https://www.suse.com/security/cve/CVE-2011-3048/", }, { category: "self", summary: "SUSE CVE CVE-2012-3386 page", url: "https://www.suse.com/security/cve/CVE-2012-3386/", }, { category: "self", summary: "SUSE CVE CVE-2013-7353 page", url: "https://www.suse.com/security/cve/CVE-2013-7353/", }, { category: "self", summary: "SUSE CVE CVE-2013-7354 page", url: "https://www.suse.com/security/cve/CVE-2013-7354/", }, { category: "self", summary: "SUSE CVE CVE-2014-9495 page", url: "https://www.suse.com/security/cve/CVE-2014-9495/", }, { category: "self", summary: "SUSE CVE CVE-2015-0973 page", url: "https://www.suse.com/security/cve/CVE-2015-0973/", }, { category: "self", summary: "SUSE CVE CVE-2015-8126 page", url: "https://www.suse.com/security/cve/CVE-2015-8126/", }, { category: "self", summary: "SUSE CVE CVE-2015-8540 page", url: "https://www.suse.com/security/cve/CVE-2015-8540/", }, ], title: "libpng12-0-1.2.56-1.5 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10184-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libpng12-0-1.2.56-1.5.aarch64", product: { name: "libpng12-0-1.2.56-1.5.aarch64", product_id: "libpng12-0-1.2.56-1.5.aarch64", }, }, { category: "product_version", name: "libpng12-0-32bit-1.2.56-1.5.aarch64", product: { name: "libpng12-0-32bit-1.2.56-1.5.aarch64", product_id: "libpng12-0-32bit-1.2.56-1.5.aarch64", }, }, { category: "product_version", name: "libpng12-compat-devel-1.2.56-1.5.aarch64", product: { name: "libpng12-compat-devel-1.2.56-1.5.aarch64", product_id: "libpng12-compat-devel-1.2.56-1.5.aarch64", }, }, { category: "product_version", name: "libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", product: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", product_id: "libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", }, }, { category: "product_version", name: "libpng12-devel-1.2.56-1.5.aarch64", product: { name: "libpng12-devel-1.2.56-1.5.aarch64", product_id: "libpng12-devel-1.2.56-1.5.aarch64", }, }, { category: "product_version", name: "libpng12-devel-32bit-1.2.56-1.5.aarch64", product: { name: "libpng12-devel-32bit-1.2.56-1.5.aarch64", product_id: "libpng12-devel-32bit-1.2.56-1.5.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libpng12-0-1.2.56-1.5.ppc64le", product: { name: "libpng12-0-1.2.56-1.5.ppc64le", product_id: "libpng12-0-1.2.56-1.5.ppc64le", }, }, { category: "product_version", name: "libpng12-0-32bit-1.2.56-1.5.ppc64le", product: { name: "libpng12-0-32bit-1.2.56-1.5.ppc64le", product_id: "libpng12-0-32bit-1.2.56-1.5.ppc64le", }, }, { category: "product_version", name: "libpng12-compat-devel-1.2.56-1.5.ppc64le", product: { name: "libpng12-compat-devel-1.2.56-1.5.ppc64le", product_id: "libpng12-compat-devel-1.2.56-1.5.ppc64le", }, }, { category: "product_version", name: "libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", product: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", product_id: "libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", }, }, { category: "product_version", name: "libpng12-devel-1.2.56-1.5.ppc64le", product: { name: "libpng12-devel-1.2.56-1.5.ppc64le", product_id: "libpng12-devel-1.2.56-1.5.ppc64le", }, }, { category: "product_version", name: "libpng12-devel-32bit-1.2.56-1.5.ppc64le", product: { name: "libpng12-devel-32bit-1.2.56-1.5.ppc64le", product_id: "libpng12-devel-32bit-1.2.56-1.5.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libpng12-0-1.2.56-1.5.s390x", product: { name: "libpng12-0-1.2.56-1.5.s390x", product_id: "libpng12-0-1.2.56-1.5.s390x", }, }, { category: "product_version", name: "libpng12-0-32bit-1.2.56-1.5.s390x", product: { name: "libpng12-0-32bit-1.2.56-1.5.s390x", product_id: "libpng12-0-32bit-1.2.56-1.5.s390x", }, }, { category: "product_version", name: "libpng12-compat-devel-1.2.56-1.5.s390x", product: { name: "libpng12-compat-devel-1.2.56-1.5.s390x", product_id: "libpng12-compat-devel-1.2.56-1.5.s390x", }, }, { category: "product_version", name: "libpng12-compat-devel-32bit-1.2.56-1.5.s390x", product: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.s390x", product_id: "libpng12-compat-devel-32bit-1.2.56-1.5.s390x", }, }, { category: "product_version", name: "libpng12-devel-1.2.56-1.5.s390x", product: { name: "libpng12-devel-1.2.56-1.5.s390x", product_id: "libpng12-devel-1.2.56-1.5.s390x", }, }, { category: "product_version", name: "libpng12-devel-32bit-1.2.56-1.5.s390x", product: { name: "libpng12-devel-32bit-1.2.56-1.5.s390x", product_id: "libpng12-devel-32bit-1.2.56-1.5.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libpng12-0-1.2.56-1.5.x86_64", product: { name: "libpng12-0-1.2.56-1.5.x86_64", product_id: "libpng12-0-1.2.56-1.5.x86_64", }, }, { category: "product_version", name: "libpng12-0-32bit-1.2.56-1.5.x86_64", product: { name: "libpng12-0-32bit-1.2.56-1.5.x86_64", product_id: "libpng12-0-32bit-1.2.56-1.5.x86_64", }, }, { category: "product_version", name: "libpng12-compat-devel-1.2.56-1.5.x86_64", product: { name: "libpng12-compat-devel-1.2.56-1.5.x86_64", product_id: "libpng12-compat-devel-1.2.56-1.5.x86_64", }, }, { category: "product_version", name: "libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", product: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", product_id: "libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", }, }, { category: "product_version", name: "libpng12-devel-1.2.56-1.5.x86_64", product: { name: "libpng12-devel-1.2.56-1.5.x86_64", product_id: "libpng12-devel-1.2.56-1.5.x86_64", }, }, { category: "product_version", name: "libpng12-devel-32bit-1.2.56-1.5.x86_64", product: { name: "libpng12-devel-32bit-1.2.56-1.5.x86_64", product_id: "libpng12-devel-32bit-1.2.56-1.5.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libpng12-0-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", }, product_reference: "libpng12-0-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-0-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", }, product_reference: "libpng12-0-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", }, product_reference: "libpng12-0-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-32bit-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", }, product_reference: "libpng12-0-32bit-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-32bit-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-0-32bit-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-32bit-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", }, product_reference: "libpng12-0-32bit-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-0-32bit-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", }, product_reference: "libpng12-0-32bit-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", }, product_reference: "libpng12-compat-devel-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-compat-devel-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", }, product_reference: "libpng12-compat-devel-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", }, product_reference: "libpng12-compat-devel-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", }, product_reference: "libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", }, product_reference: "libpng12-compat-devel-32bit-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-compat-devel-32bit-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", }, product_reference: "libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", }, product_reference: "libpng12-devel-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-devel-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", }, product_reference: "libpng12-devel-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", }, product_reference: "libpng12-devel-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-32bit-1.2.56-1.5.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", }, product_reference: "libpng12-devel-32bit-1.2.56-1.5.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-32bit-1.2.56-1.5.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", }, product_reference: "libpng12-devel-32bit-1.2.56-1.5.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-32bit-1.2.56-1.5.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", }, product_reference: "libpng12-devel-32bit-1.2.56-1.5.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libpng12-devel-32bit-1.2.56-1.5.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", }, product_reference: "libpng12-devel-32bit-1.2.56-1.5.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2010-1205", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1205", }, ], notes: [ { category: "general", text: "Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1205", url: "https://www.suse.com/security/cve/CVE-2010-1205", }, { category: "external", summary: "SUSE Bug 1188284 for CVE-2010-1205", url: "https://bugzilla.suse.com/1188284", }, { category: "external", summary: "SUSE Bug 617866 for CVE-2010-1205", url: "https://bugzilla.suse.com/617866", }, { category: "external", summary: "SUSE Bug 622506 for CVE-2010-1205", url: "https://bugzilla.suse.com/622506", }, { category: "external", summary: "SUSE Bug 639941 for CVE-2010-1205", url: "https://bugzilla.suse.com/639941", }, { category: "external", summary: "SUSE Bug 854395 for CVE-2010-1205", url: "https://bugzilla.suse.com/854395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2010-1205", }, { cve: "CVE-2011-2501", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-2501", }, ], notes: [ { category: "general", text: "The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-2501", url: "https://www.suse.com/security/cve/CVE-2011-2501", }, { category: "external", summary: "SUSE Bug 702578 for CVE-2011-2501", url: "https://bugzilla.suse.com/702578", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-2501", }, { cve: "CVE-2011-3026", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3026", }, ], notes: [ { category: "general", text: "Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3026", url: "https://www.suse.com/security/cve/CVE-2011-3026", }, { category: "external", summary: "SUSE Bug 747311 for CVE-2011-3026", url: "https://bugzilla.suse.com/747311", }, { category: "external", summary: "SUSE Bug 747327 for CVE-2011-3026", url: "https://bugzilla.suse.com/747327", }, { category: "external", summary: "SUSE Bug 747328 for CVE-2011-3026", url: "https://bugzilla.suse.com/747328", }, { category: "external", summary: "SUSE Bug 773612 for CVE-2011-3026", url: "https://bugzilla.suse.com/773612", }, { category: "external", summary: "SUSE Bug 854395 for CVE-2011-3026", url: "https://bugzilla.suse.com/854395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2011-3026", }, { cve: "CVE-2011-3045", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3045", }, ], notes: [ { category: "general", text: "Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3045", url: "https://www.suse.com/security/cve/CVE-2011-3045", }, { category: "external", summary: "SUSE Bug 752008 for CVE-2011-3045", url: "https://bugzilla.suse.com/752008", }, { category: "external", summary: "SUSE Bug 754456 for CVE-2011-3045", url: "https://bugzilla.suse.com/754456", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-3045", }, { cve: "CVE-2011-3048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3048", }, ], notes: [ { category: "general", text: "The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3048", url: "https://www.suse.com/security/cve/CVE-2011-3048", }, { category: "external", summary: "SUSE Bug 754745 for CVE-2011-3048", url: "https://bugzilla.suse.com/754745", }, { category: "external", summary: "SUSE Bug 854395 for CVE-2011-3048", url: "https://bugzilla.suse.com/854395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-3048", }, { cve: "CVE-2012-3386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-3386", }, ], notes: [ { category: "general", text: "The \"make distcheck\" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-3386", url: "https://www.suse.com/security/cve/CVE-2012-3386", }, { category: "external", summary: "SUSE Bug 770618 for CVE-2012-3386", url: "https://bugzilla.suse.com/770618", }, { category: "external", summary: "SUSE Bug 786745 for CVE-2012-3386", url: "https://bugzilla.suse.com/786745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-3386", }, { cve: "CVE-2013-7353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-7353", }, ], notes: [ { category: "general", text: "Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-7353", url: "https://www.suse.com/security/cve/CVE-2013-7353", }, { category: "external", summary: "SUSE Bug 873124 for CVE-2013-7353", url: "https://bugzilla.suse.com/873124", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-7353", }, { cve: "CVE-2013-7354", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-7354", }, ], notes: [ { category: "general", text: "Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-7354", url: "https://www.suse.com/security/cve/CVE-2013-7354", }, { category: "external", summary: "SUSE Bug 873123 for CVE-2013-7354", url: "https://bugzilla.suse.com/873123", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-7354", }, { cve: "CVE-2014-9495", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9495", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a \"very wide interlaced\" PNG image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9495", url: "https://www.suse.com/security/cve/CVE-2014-9495", }, { category: "external", summary: "SUSE Bug 912076 for CVE-2014-9495", url: "https://bugzilla.suse.com/912076", }, { category: "external", summary: "SUSE Bug 912929 for CVE-2014-9495", url: "https://bugzilla.suse.com/912929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-9495", }, { cve: "CVE-2015-0973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0973", }, ], notes: [ { category: "general", text: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0973", url: "https://www.suse.com/security/cve/CVE-2015-0973", }, { category: "external", summary: "SUSE Bug 912929 for CVE-2015-0973", url: "https://bugzilla.suse.com/912929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-0973", }, { cve: "CVE-2015-8126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8126", }, ], notes: [ { category: "general", text: "Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8126", url: "https://www.suse.com/security/cve/CVE-2015-8126", }, { category: "external", summary: "SUSE Bug 954980 for CVE-2015-8126", url: "https://bugzilla.suse.com/954980", }, { category: "external", summary: "SUSE Bug 958198 for CVE-2015-8126", url: "https://bugzilla.suse.com/958198", }, { category: "external", summary: "SUSE Bug 960402 for CVE-2015-8126", url: "https://bugzilla.suse.com/960402", }, { category: "external", summary: "SUSE Bug 962743 for CVE-2015-8126", url: "https://bugzilla.suse.com/962743", }, { category: "external", summary: "SUSE Bug 963937 for CVE-2015-8126", url: "https://bugzilla.suse.com/963937", }, { category: "external", summary: "SUSE Bug 969333 for CVE-2015-8126", url: "https://bugzilla.suse.com/969333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-8126", }, { cve: "CVE-2015-8540", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8540", }, ], notes: [ { category: "general", text: "Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8540", url: "https://www.suse.com/security/cve/CVE-2015-8540", }, { category: "external", summary: "SUSE Bug 1149680 for CVE-2015-8540", url: "https://bugzilla.suse.com/1149680", }, { category: "external", summary: "SUSE Bug 958791 for CVE-2015-8540", url: "https://bugzilla.suse.com/958791", }, { category: "external", summary: "SUSE Bug 963937 for CVE-2015-8540", url: "https://bugzilla.suse.com/963937", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-0-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-1.2.56-1.5.x86_64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.aarch64", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.ppc64le", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.s390x", "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.56-1.5.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2015-8540", }, ], }
fkie_cve-2015-0973
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
oracle | solaris | 11.2 | |
libpng | libpng | * | |
libpng | libpng | 1.6.0 | |
libpng | libpng | 1.6.0 | |
libpng | libpng | 1.6.1 | |
libpng | libpng | 1.6.1 | |
libpng | libpng | 1.6.2 | |
libpng | libpng | 1.6.2 | |
libpng | libpng | 1.6.3 | |
libpng | libpng | 1.6.3 | |
libpng | libpng | 1.6.4 | |
libpng | libpng | 1.6.4 | |
libpng | libpng | 1.6.5 | |
libpng | libpng | 1.6.6 | |
libpng | libpng | 1.6.7 | |
libpng | libpng | 1.6.7 | |
libpng | libpng | 1.6.8 | |
libpng | libpng | 1.6.8 | |
libpng | libpng | 1.6.9 | |
libpng | libpng | 1.6.9 | |
libpng | libpng | 1.6.10 | |
libpng | libpng | 1.6.10 | |
libpng | libpng | 1.6.11 | |
libpng | libpng | 1.6.11 | |
libpng | libpng | 1.6.12 | |
libpng | libpng | 1.6.13 | |
libpng | libpng | 1.6.13 | |
libpng | libpng | 1.6.14 | |
libpng | libpng | 1.6.14 | |
libpng | libpng | 1.6.15 | |
libpng | libpng | 1.6.15 | |
apple | mac_os_x | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", matchCriteriaId: "0B1C288F-326B-497B-B26C-D26E01262DDB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", matchCriteriaId: "83D384F2-90CA-4A6A-82C0-95F572099E78", versionEndIncluding: "1.5.20", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*", matchCriteriaId: "B7A0D174-F35C-488B-8577-00EFB7741089", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*", matchCriteriaId: "051989A3-3F72-4223-98DF-54B0488656F9", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "9EDC5DA5-F2A7-4819-BB9D-258EB9AB7857", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*", matchCriteriaId: "02FCC235-9564-4B92-B1AB-294EAB110E95", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*", matchCriteriaId: "27B34D78-C0BC-45DC-AD84-F5F13451ED7E", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*", matchCriteriaId: "40C344C8-812C-4EDE-9AD6-31EF7F0E24C2", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F3D3A7EC-774C-423F-BDE1-CDCB9433D87B", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*", matchCriteriaId: "B9353E66-56D2-4CD1-BC30-5B2FF0F4E722", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*", matchCriteriaId: "0B898B95-CF41-4813-8FE7-776BD59A6A9F", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*", matchCriteriaId: "5D9BF9ED-965A-4BF5-A3EC-FAFCE880F14A", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*", matchCriteriaId: "9F5E5899-5A3F-49A1-B18C-4C97566B87BA", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*", matchCriteriaId: "C7897EEC-DE43-485A-B2CD-E8623A6D2C8A", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*", matchCriteriaId: "ACC16FE2-E94E-45B9-94F0-B6434B21DD2F", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*", matchCriteriaId: "278434CA-DD56-47FC-9C15-4B9D4159786C", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*", matchCriteriaId: "8C8DAE31-CCA9-450D-90E5-B8F0490FB944", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*", matchCriteriaId: "0C5712AB-1A98-45DB-8384-5CD70D03684C", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*", matchCriteriaId: "52FEB5C9-0C13-4FD6-876C-AAE7ED4E986C", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*", matchCriteriaId: "B2903D2B-A99A-4120-88DC-A1DF59085F59", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*", matchCriteriaId: "2337F9F3-D26D-4A24-880A-800CD5C16795", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.10:beta:*:*:*:*:*:*", matchCriteriaId: "D97CC2D1-657A-48D7-8035-89986341B56C", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*", matchCriteriaId: "31F71BA3-5402-448E-9068-EB0DCA1D62EA", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.11:beta:*:*:*:*:*:*", matchCriteriaId: "3539DE6A-05BE-47EB-A89F-D3E4D98FC014", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.12:beta:*:*:*:*:*:*", matchCriteriaId: "4A004603-261B-49DB-B15B-A8EE0F3AB4BF", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*", matchCriteriaId: "AD67323A-8463-4B8F-B370-40C2ACFF4D8B", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.13:beta:*:*:*:*:*:*", matchCriteriaId: "6944746B-2032-4088-A7EB-EE004F12274E", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*", matchCriteriaId: "2BBA4F43-0FD0-4D7D-84A0-37C8E79B9B29", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.14:beta:*:*:*:*:*:*", matchCriteriaId: "7AC27CC2-D64C-4AED-A0DF-F6F2920D7AB5", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*", matchCriteriaId: "71E01CC8-1C29-4C46-8213-B48A2364CE8C", vulnerable: true, }, { criteria: "cpe:2.3:a:libpng:libpng:1.6.15:beta:*:*:*:*:*:*", matchCriteriaId: "2A8396AB-D983-4F04-A9F5-FA120A0E0AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", matchCriteriaId: "D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82", versionEndIncluding: "10.11.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", }, { lang: "es", value: "Desbordamiento de buffer en la función png_read_IDAT_data en pngrutil.c en libpng anterior a 1.5.21 y 1.6.x anterior a 1.6.16 permite a atacantes dependientes de contexto ejecutar código arbitrario a través de datos IDAT con una anchura grande, una vulnerabilidad diferente a CVE-2014-9495.", }, ], id: "CVE-2015-0973", lastModified: "2025-04-12T10:46:40.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2015-01-18T18:59:03.020", references: [ { source: "cret@cert.org", tags: [ "Vendor Advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { source: "cret@cert.org", tags: [ "Permissions Required", "Third Party Advisory", ], url: "http://secunia.com/advisories/62725", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { source: "cret@cert.org", tags: [ "Exploit", ], url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { source: "cret@cert.org", tags: [ "Exploit", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { source: "cret@cert.org", tags: [ "Exploit", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "cret@cert.org", url: "https://security.netapp.com/advisory/ntap-20240719-0005/", }, { source: "cret@cert.org", tags: [ "Vendor Advisory", ], url: "https://support.apple.com/HT206167", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Third Party Advisory", ], url: "http://secunia.com/advisories/62725", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240719-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://support.apple.com/HT206167", }, ], sourceIdentifier: "cret@cert.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-201501-0119
Vulnerability from variot
Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495. libpng is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied input. Failed attacks will cause denial-of-service conditions. libpng is a PNG reference library that can create, read and write PNG graphics files. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
OS X El Capitan 10.11.4 and Security Update 2016-002 is now available and addresses the following:
apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team
AppleRAID Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team
AppleUSBNetworking Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of data from USB devices. This issue was addressed through improved input validation. CVE-ID CVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path
Bluetooth Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1735 : Jeonghoon Shin@A.D.D CVE-2016-1736 : beist and ABH of BoB
Carbon Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .dfont file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2016-1737 : an anonymous researcher
dyld Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker may tamper with code-signed applications to execute arbitrary code in the application's context Description: A code signing verification issue existed in dyld. This issue was addressed with improved validation. CVE-ID CVE-2016-1738 : beist and ABH of BoB
FontParser Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with Trend Micro's Zero Day Initiative (ZDI)
HTTPProtocol Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to execute arbitrary code Description: Multiple vulnerabilities existed in nghttp2 versions prior to 1.6.0, the most serious of which may have led to remote code execution. These were addressed by updating nghttp2 to version 1.6.0. CVE-ID CVE-2015-8659
Intel Graphics Driver Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1743 : Piotr Bania of Cisco Talos CVE-2016-1744 : Ian Beer of Google Project Zero
IOFireWireFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to cause a denial of service Description: A null pointer dereference was addressed through improved validation. CVE-ID CVE-2016-1745 : sweetchip of Grayhash
IOGraphics Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-ID CVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
IOHIDFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1748 : Brandon Azad
IOUSBFamily Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-ID CVE-2016-1750 : CESG
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition existed during the creation of new processes. This was addressed through improved state handling. CVE-ID CVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-ID CVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team
Kernel Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team CVE-2016-1755 : Ian Beer of Google Project Zero CVE-2016-1759 : lokihardt
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-ID CVE-2016-1758 : Brandon Azad
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple integer overflows were addressed through improved input validation. CVE-ID CVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero Day Initiative (ZDI)
Kernel Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved validation. CVE-ID CVE-2016-1752 : CESG
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2015-1819 CVE-2015-5312 : David Drysdale of Google CVE-2015-7499 CVE-2015-7500 : Kostya Serebryany of Google CVE-2015-7942 : Kostya Serebryany of Google CVE-2015-8035 : gustavo.grieco CVE-2015-8242 : Hugh Davenport CVE-2016-1761 : wol0xff working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1762
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker who is able to bypass Apple's certificate pinning, intercept TLS connections, inject messages, and record encrypted attachment-type messages may be able to read attachments Description: A cryptographic issue was addressed by rejecting duplicate messages on the client. CVE-ID CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan of Johns Hopkins University
Messages Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a JavaScript link can reveal sensitive user information Description: An issue existed in the processing of JavaScript links. This issue was addressed through improved content security policy checks. CVE-ID CVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of Bishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox
NVIDIA Graphics Drivers Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1741 : Ian Beer of Google Project Zero
OpenSSH Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Connecting to a server may leak sensitive user information, such as a client's private keys Description: Roaming, which was on by default in the OpenSSH client, exposed an information leak and a buffer overflow. These issues were addressed by disabling roaming in the client. CVE-ID CVE-2016-0777 : Qualys CVE-2016-0778 : Qualys
OpenSSH Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Multiple vulnerabilities in LibreSSL Description: Multiple vulnerabilities existed in LibreSSL versions prior to 2.1.8. These were addressed by updating LibreSSL to version 2.1.8. CVE-ID CVE-2015-5333 : Qualys CVE-2015-5334 : Qualys
OpenSSL Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A remote attacker may be able to cause a denial of service Description: A memory leak existed in OpenSSL versions prior to 0.9.8zh. This issue was addressed by updating OpenSSL to version 0.9.8zh. CVE-ID CVE-2015-3195
Python Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted .png file may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libpng versions prior to 1.6.20. These were addressed by updating libpng to version 1.6.20. CVE-ID CVE-2014-9495 CVE-2015-0973 CVE-2015-8126 : Adam Mariš CVE-2015-8472 : Adam Mariš
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1767 : Francis Provencher from COSIG CVE-2016-1768 : Francis Provencher from COSIG
QuickTime Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1769 : Francis Provencher from COSIG
Reminders Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Clicking a tel link can make a call without prompting the user Description: A user was not prompted before invoking a call. This was addressed through improved entitlement checks. CVE-ID CVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of Laurent.ca
Ruby Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An unsafe tainted string usage vulnerability existed in versions prior to 2.0.0-p648. This issue was addressed by updating to version 2.0.0-p648. CVE-ID CVE-2015-7551
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: A local user may be able to check for the existence of arbitrary files Description: A permissions issue existed in code signing tools. This was addressed though additional ownership checks. CVE-ID CVE-2016-1773 : Mark Mentovai of Google Inc.
Security Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A memory corruption issue existed in the ASN.1 decoder. This issue was addressed through improved input validation. CVE-ID CVE-2016-1950 : Francis Gabriel of Quarkslab
Tcl
Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3
Impact: Processing a maliciously crafted .png file may lead to
arbitrary code execution
Description: Multiple vulnerabilities existed in libpng versions
prior to 1.6.20. These were addressed by removing libpng.
CVE-ID
CVE-2015-8126 : Adam Mariš
TrueTypeScaler Available for: OS X El Capitan v10.11 to v10.11.3 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI)
Wi-Fi Available for: OS X El Capitan v10.11 to v10.11.3 Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: A frame validation and memory corruption issue existed for a given ethertype. This issue was addressed through additional ethertype validation and improved memory handling. CVE-ID CVE-2016-0801 : an anonymous researcher CVE-2016-0802 : an anonymous researcher
OS X El Capitan 10.11.4 includes the security content of Safari 9.1. https://support.apple.com/kb/HT206171
OS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJW8JQFAAoJEBcWfLTuOo7tZSYP/1bHFA1qemkD37uu7nYpk/q6 ARVsPgME1I1+5tOxX0TQJgzMBmdQsKYdsTiLpDk5HTuv+dAMsFfasaUItGk8Sz1w HiYjSfVsxL+Pjz3vK8/4/fsi2lX6472MElRw8gudITOhXtniGcKo/vuA5dB+vM3l Jy1NLHHhZ6BD2t0bBmlz41mZMG3AMxal2wfqE+5LkjUwASzcvC/3B1sh7Fntwyau /71vIgMQ5AaETdgQJAuQivxPyTlFduBRgLjqvPiB9eSK4Ctu5t/hErFIrP2NiDCi UhfZC48XbiRjJfkUsUD/5TIKnI+jkZxOnch9ny32dw2kUIkbIAbqufTkzsMXOpng O+rI93Ni7nfzgI3EkI2bq+C+arOoRiveWuJvc3SMPD5RQHo4NCQVs0ekQJKNHF78 juPnY29n8WMjwLS6Zfm+bH+n8ELIXrmmEscRztK2efa9S7vJe+AgIxx7JE/f8OHF i9K7UQBXFXcpMjXi1aTby/IUnpL5Ny4NVwYwIhctj0Mf6wTH7uf/FMWYIQOXcIfP Izo+GXxNeLd4H2ypZ+UpkZg/Sn2mtCd88wLc96+owlZPBlSqWl3X1wTlp8i5FP2X qlQ7RcTHJDv8jPT/MOfzxEK1n/azp45ahHA0o6nohUdxlA7PLci9vPiJxqKPo/0q VZmOKa8qMxB1L/JmdCqy =mZR+ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0119", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "libpng", scope: "eq", trust: 1.6, vendor: "libpng", version: "1.6.14", }, { model: "libpng", scope: "eq", trust: 1.6, vendor: "libpng", version: "1.6.15", }, { model: "libpng", scope: "lte", trust: 1, vendor: "libpng", version: "1.5.20", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.7", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.8", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.4", }, { model: "mac os x", scope: "lte", trust: 1, vendor: "apple", version: "10.11.3", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.2", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.3", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.6", }, { model: "solaris", scope: "eq", trust: 1, vendor: "oracle", version: "11.2", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.12", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.10", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.13", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.5", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.0", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.1", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.9", }, { model: "libpng", scope: "eq", trust: 1, vendor: "libpng", version: "1.6.11", }, { model: "mac os x", scope: "eq", trust: 0.8, vendor: "apple", version: "10.9.5", }, { model: "libpng", scope: "lt", trust: 0.8, vendor: "png group", version: "1.6.x", }, { model: "libpng", scope: "eq", trust: 0.8, vendor: "png group", version: "1.6.16", }, { model: "mac os x", scope: "eq", trust: 0.8, vendor: "apple", version: "10.10.5", }, { model: "mac os x", scope: "eq", trust: 0.8, vendor: "apple", version: "10.11 to 10.11.3", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.5", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.4", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.8", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.7", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.6", }, { model: "libpng", scope: "eq", trust: 0.3, vendor: "libpng", version: "1.5.10", }, { model: "tivoli common reporting", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.1", }, ], sources: [ { db: "BID", id: "71994", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "NVD", id: "CVE-2015-0973", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.10:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.11:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.14:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.15:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.5.20", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.12:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.13:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "10.11.3", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2015-0973", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "John Bowler", sources: [ { db: "BID", id: "71994", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], trust: 0.9, }, cve: "CVE-2015-0973", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 7.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2015-0973", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-78919", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2015-0973", trust: 1.8, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201501-232", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-78919", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2015-0973", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-78919", }, { db: "VULMON", id: "CVE-2015-0973", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "NVD", id: "CVE-2015-0973", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495. libpng is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied input. Failed attacks will cause denial-of-service conditions. libpng is a PNG reference library that can create, read and write PNG graphics files. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update\n2016-002\n\nOS X El Capitan 10.11.4 and Security Update 2016-002 is now available\nand addresses the following:\n\napache_mod_php\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2015-8126 : Adam Mariš\nCVE-2015-8472 : Adam Mariš\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1733 : Proteas of Qihoo 360 Nirvan Team\n\nAppleRAID\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1732 : Proteas of Qihoo 360 Nirvan Team\n\nAppleUSBNetworking\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the parsing of\ndata from USB devices. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1734 : Andrea Barisani and Andrej Rosano of Inverse Path\n\nBluetooth\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1735 : Jeonghoon Shin@A.D.D\nCVE-2016-1736 : beist and ABH of BoB\n\nCarbon\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .dfont file may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues existed in the\nhandling of font files. These issues were addressed through improved\nbounds checking. \nCVE-ID\nCVE-2016-1737 : an anonymous researcher\n\ndyld\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker may tamper with code-signed applications to\nexecute arbitrary code in the application's context\nDescription: A code signing verification issue existed in dyld. This\nissue was addressed with improved validation. \nCVE-ID\nCVE-2016-1738 : beist and ABH of BoB\n\nFontParser\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1740 : HappilyCoded (ant4g0nist and r3dsm0k3) working with\nTrend Micro's Zero Day Initiative (ZDI)\n\nHTTPProtocol\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple vulnerabilities existed in nghttp2 versions\nprior to 1.6.0, the most serious of which may have led to remote code\nexecution. These were addressed by updating nghttp2 to version 1.6.0. \nCVE-ID\nCVE-2015-8659\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1743 : Piotr Bania of Cisco Talos\nCVE-2016-1744 : Ian Beer of Google Project Zero\n\nIOFireWireFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to cause a denial of service\nDescription: A null pointer dereference was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1745 : sweetchip of Grayhash\n\nIOGraphics\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1746 : Peter Pi of Trend Micro working with Trend Micro's\nZero Day Initiative (ZDI)\nCVE-2016-1747 : Juwei Lin of Trend Micro working with Trend Micro's\nZero Day Initiative (ZDI)\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1748 : Brandon Azad\n\nIOUSBFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1749 : Ian Beer of Google Project Zero and Juwei Lin of\nTrend Micro working with Trend Micro's Zero Day Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2016-1750 : CESG\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition existed during the creation of new\nprocesses. This was addressed through improved state handling. \nCVE-ID\nCVE-2016-1757 : Ian Beer of Google Project Zero and Pedro Vilaca\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1756 : Lufeng Li of Qihoo 360 Vulcan Team\n\nKernel\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1754 : Lufeng Li of Qihoo 360 Vulcan Team\nCVE-2016-1755 : Ian Beer of Google Project Zero\nCVE-2016-1759 : lokihardt\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to determine kernel memory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-ID\nCVE-2016-1758 : Brandon Azad\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple integer overflows were addressed through\nimproved input validation. \nCVE-ID\nCVE-2016-1753 : Juwei Lin Trend Micro working with Trend Micro's Zero\nDay Initiative (ZDI)\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to cause a denial of service\nDescription: A denial of service issue was addressed through\nimproved validation. \nCVE-ID\nCVE-2016-1752 : CESG\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2015-1819\nCVE-2015-5312 : David Drysdale of Google\nCVE-2015-7499\nCVE-2015-7500 : Kostya Serebryany of Google\nCVE-2015-7942 : Kostya Serebryany of Google\nCVE-2015-8035 : gustavo.grieco\nCVE-2015-8242 : Hugh Davenport\nCVE-2016-1761 : wol0xff working with Trend Micro's Zero Day\nInitiative (ZDI)\nCVE-2016-1762\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker who is able to bypass Apple's certificate\npinning, intercept TLS connections, inject messages, and record\nencrypted attachment-type messages may be able to read attachments\nDescription: A cryptographic issue was addressed by rejecting\nduplicate messages on the client. \nCVE-ID\nCVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk,\nIan Miers, and Michael Rushanan of Johns Hopkins University\n\nMessages\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a JavaScript link can reveal sensitive user\ninformation\nDescription: An issue existed in the processing of JavaScript links. \nThis issue was addressed through improved content security policy\nchecks. \nCVE-ID\nCVE-2016-1764 : Matthew Bryan of the Uber Security Team (formerly of\nBishop Fox), Joe DeMesy and Shubham Shah of Bishop Fox\n\nNVIDIA Graphics Drivers\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1741 : Ian Beer of Google Project Zero\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Connecting to a server may leak sensitive user information,\nsuch as a client's private keys\nDescription: Roaming, which was on by default in the OpenSSH client,\nexposed an information leak and a buffer overflow. These issues were\naddressed by disabling roaming in the client. \nCVE-ID\nCVE-2016-0777 : Qualys\nCVE-2016-0778 : Qualys\n\nOpenSSH\nAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5\nImpact: Multiple vulnerabilities in LibreSSL\nDescription: Multiple vulnerabilities existed in LibreSSL versions\nprior to 2.1.8. These were addressed by updating LibreSSL to version\n2.1.8. \nCVE-ID\nCVE-2015-5333 : Qualys\nCVE-2015-5334 : Qualys\n\nOpenSSL\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A memory leak existed in OpenSSL versions prior to\n0.9.8zh. This issue was addressed by updating OpenSSL to version\n0.9.8zh. \nCVE-ID\nCVE-2015-3195\n\nPython\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by updating libpng to version\n1.6.20. \nCVE-ID\nCVE-2014-9495\nCVE-2015-0973\nCVE-2015-8126 : Adam Mariš\nCVE-2015-8472 : Adam Mariš\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1767 : Francis Provencher from COSIG\nCVE-2016-1768 : Francis Provencher from COSIG\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-ID\nCVE-2016-1769 : Francis Provencher from COSIG\n\nReminders\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Clicking a tel link can make a call without prompting the\nuser\nDescription: A user was not prompted before invoking a call. This\nwas addressed through improved entitlement checks. \nCVE-ID\nCVE-2016-1770 : Guillaume Ross of Rapid7 and Laurent Chouinard of\nLaurent.ca\n\nRuby\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An unsafe tainted string usage vulnerability existed in\nversions prior to 2.0.0-p648. This issue was addressed by updating to\nversion 2.0.0-p648. \nCVE-ID\nCVE-2015-7551\n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: A local user may be able to check for the existence of\narbitrary files\nDescription: A permissions issue existed in code signing tools. This\nwas addressed though additional ownership checks. \nCVE-ID\nCVE-2016-1773 : Mark Mentovai of Google Inc. \n\nSecurity\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the ASN.1 decoder. \nThis issue was addressed through improved input validation. \nCVE-ID\nCVE-2016-1950 : Francis Gabriel of Quarkslab\n\nTcl\nAvailable for: \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted .png file may lead to\narbitrary code execution\nDescription: Multiple vulnerabilities existed in libpng versions\nprior to 1.6.20. These were addressed by removing libpng. \nCVE-ID\nCVE-2015-8126 : Adam Mariš\n\nTrueTypeScaler\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2016-1775 : 0x1byte working with Trend Micro's Zero Day\nInitiative (ZDI)\n\nWi-Fi\nAvailable for: OS X El Capitan v10.11 to v10.11.3\nImpact: An attacker with a privileged network position may be able\nto execute arbitrary code\nDescription: A frame validation and memory corruption issue existed\nfor a given ethertype. This issue was addressed through additional\nethertype validation and improved memory handling. \nCVE-ID\nCVE-2016-0801 : an anonymous researcher\nCVE-2016-0802 : an anonymous researcher\n\nOS X El Capitan 10.11.4 includes the security content of Safari 9.1. \nhttps://support.apple.com/kb/HT206171\n\nOS X El Capitan v10.11.4 and Security Update 2016-002 may be obtained\nfrom the Mac App Store or Apple's Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nVZmOKa8qMxB1L/JmdCqy\n=mZR+\n-----END PGP SIGNATURE-----\n", sources: [ { db: "NVD", id: "CVE-2015-0973", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "BID", id: "71994", }, { db: "VULHUB", id: "VHN-78919", }, { db: "VULMON", id: "CVE-2015-0973", }, { db: "PACKETSTORM", id: "136346", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2015-0973", trust: 3, }, { db: "OPENWALL", id: "OSS-SECURITY/2015/01/10/1", trust: 2.6, }, { db: "OPENWALL", id: "OSS-SECURITY/2015/01/10/3", trust: 1.8, }, { db: "SECUNIA", id: "62725", trust: 1.2, }, { db: "BID", id: "71994", trust: 1.1, }, { db: "JVN", id: "JVNVU97668313", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2015-001198", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201501-232", trust: 0.7, }, { db: "NSFOCUS", id: "28941", trust: 0.6, }, { db: "VULHUB", id: "VHN-78919", trust: 0.1, }, { db: "VULMON", id: "CVE-2015-0973", trust: 0.1, }, { db: "PACKETSTORM", id: "136346", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-78919", }, { db: "VULMON", id: "CVE-2015-0973", }, { db: "BID", id: "71994", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "PACKETSTORM", id: "136346", }, { db: "NVD", id: "CVE-2015-0973", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], }, id: "VAR-201501-0119", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-78919", }, ], trust: 0.01, }, last_update_date: "2023-12-18T11:39:44.140000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html", }, { title: "HT206167", trust: 0.8, url: "https://support.apple.com/en-us/ht206167", }, { title: "HT206167", trust: 0.8, url: "https://support.apple.com/ja-jp/ht206167", }, { title: "1698994", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21698994", }, { title: "1697791", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697791", }, { title: "1699393", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699393", }, { title: "1700399", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21700399", }, { title: "Top Page", trust: 0.8, url: "http://www.libpng.org/pub/png/libpng.html", }, { title: "Oracle Solaris Third Party Bulletin - July 2015", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { title: "[png-mng-announce] libpng-1.5.21 and 1.6.16 are available", trust: 0.8, url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { title: "Red Hat: CVE-2015-0973", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2015-0973", }, { title: "Android Security Bulletins: Nexus Security Bulletin - August 2015", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=d64e515c015d4df246a74c08251f89a3", }, { title: "Apple: OS X El Capitan v10.11.4 and Security Update 2016-002", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=ef054ba76412200e34091eb91c38c281", }, { title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2015", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=8b701aba68029ec36b631a8e26157a22", }, ], sources: [ { db: "VULMON", id: "CVE-2015-0973", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-78919", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "NVD", id: "CVE-2015-0973", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { trust: 2.1, url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { trust: 1.8, url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { trust: 1.8, url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { trust: 1.5, url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { trust: 1.2, url: "http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html", }, { trust: 1.2, url: "https://support.apple.com/ht206167", }, { trust: 1.2, url: "http://secunia.com/advisories/62725", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0973", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu97668313/index.html", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0973", }, { trust: 0.7, url: "http://www.securityfocus.com/bid/71994", }, { trust: 0.6, url: "http://www.nsfocus.net/vulndb/28941", }, { trust: 0.3, url: "http://www.libpng.org/pub/png/libpng.html", }, { trust: 0.3, url: "http://sourceforge.net/p/png-mng/mailman/message/33172831/", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21698818", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21697296", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21903299", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685985", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/119.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2015-0973", }, { trust: 0.1, url: "https://source.android.com/security/bulletin/2015-08-01.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-7551", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-0777", }, { trust: 0.1, url: "https://support.apple.com/kb/ht201222", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-8659", }, { trust: 0.1, url: "https://gpgtools.org", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-8035", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-8472", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-1819", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-3195", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-7499", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-0801", }, { trust: 0.1, url: "http://www.apple.com/support/downloads/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-8242", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-8126", }, { trust: 0.1, url: "https://support.apple.com/kb/ht206171", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1732", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-5312", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-7942", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-7500", }, { trust: 0.1, url: "https://www.apple.com/support/security/pgp/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9495", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1734", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1740", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-5334", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1733", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1736", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1735", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-0778", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-5333", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-0802", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1738", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-1737", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0973", }, ], sources: [ { db: "VULHUB", id: "VHN-78919", }, { db: "VULMON", id: "CVE-2015-0973", }, { db: "BID", id: "71994", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "PACKETSTORM", id: "136346", }, { db: "NVD", id: "CVE-2015-0973", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-78919", }, { db: "VULMON", id: "CVE-2015-0973", }, { db: "BID", id: "71994", }, { db: "JVNDB", id: "JVNDB-2015-001198", }, { db: "PACKETSTORM", id: "136346", }, { db: "NVD", id: "CVE-2015-0973", }, { db: "CNNVD", id: "CNNVD-201501-232", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-01-18T00:00:00", db: "VULHUB", id: "VHN-78919", }, { date: "2015-01-18T00:00:00", db: "VULMON", id: "CVE-2015-0973", }, { date: "2015-01-10T00:00:00", db: "BID", id: "71994", }, { date: "2015-01-23T00:00:00", db: "JVNDB", id: "JVNDB-2015-001198", }, { date: "2016-03-22T15:18:02", db: "PACKETSTORM", id: "136346", }, { date: "2015-01-18T18:59:03.020000", db: "NVD", id: "CVE-2015-0973", }, { date: "2015-01-13T00:00:00", db: "CNNVD", id: "CNNVD-201501-232", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2016-10-20T00:00:00", db: "VULHUB", id: "VHN-78919", }, { date: "2016-10-20T00:00:00", db: "VULMON", id: "CVE-2015-0973", }, { date: "2016-07-06T14:08:00", db: "BID", id: "71994", }, { date: "2016-03-29T00:00:00", db: "JVNDB", id: "JVNDB-2015-001198", }, { date: "2016-10-20T18:46:05.357000", db: "NVD", id: "CVE-2015-0973", }, { date: "2015-01-19T00:00:00", db: "CNNVD", id: "CNNVD-201501-232", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201501-232", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "libpng of pngrutil.c Inside png_read_IDAT_data Buffer overflow vulnerability in functions", sources: [ { db: "JVNDB", id: "JVNDB-2015-001198", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer overflow", sources: [ { db: "CNNVD", id: "CNNVD-201501-232", }, ], trust: 0.6, }, }
gsd-2015-0973
Vulnerability from gsd
{ GSD: { alias: "CVE-2015-0973", description: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", id: "GSD-2015-0973", references: [ "https://www.suse.com/security/cve/CVE-2015-0973.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2015-0973", ], details: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", id: "GSD-2015-0973", modified: "2023-12-13T01:19:57.960826Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2015-0973", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "APPLE-SA-2016-03-21-5", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { name: "https://support.apple.com/HT206167", refsource: "CONFIRM", url: "https://support.apple.com/HT206167", }, { name: "[png-mng-announce] 20141222 libpng-1.5.21 and 1.6.16 are available", refsource: "MLIST", url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { name: "[oss-security] 20150109 Re: CVE Request: libpng 1.6.15 Heap Overflow", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, { name: "[oss-security] 20150110 Re: CVE Request: libpng 1.6.15 Heap Overflow", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { name: "62725", refsource: "SECUNIA", url: "http://secunia.com/advisories/62725", }, { name: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", refsource: "MISC", url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: "[1.6.0,1.6.15]", affected_versions: "All versions starting from 1.6.0 up to 1.6.15", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:P/A:P", cwe_ids: [ "CWE-1035", "CWE-119", "CWE-937", ], date: "2016-10-20", description: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", fixed_versions: [ "1.6.18.1", ], identifier: "CVE-2015-0973", identifiers: [ "CVE-2015-0973", ], not_impacted: "All versions before 1.6.0, all versions after 1.6.15", package_slug: "nuget/libpng", pubdate: "2015-01-18", solution: "Upgrade to version 1.6.18.1 or above.", title: "Improper Restriction of Operations within the Bounds of a Memory Buffer", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2015-0973", ], uuid: "2571d9a7-253f-494c-911b-26d156e2cd1a", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.10:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.11:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.14:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.15:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.5.20", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.8:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.9:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.12:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libpng:libpng:1.6.13:beta:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "10.11.3", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2015-0973", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", refsource: "MISC", tags: [ "Exploit", ], url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { name: "[oss-security] 20150109 Re: CVE Request: libpng 1.6.15 Heap Overflow", refsource: "MLIST", tags: [ "Exploit", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { name: "[oss-security] 20150110 Re: CVE Request: libpng 1.6.15 Heap Overflow", refsource: "MLIST", tags: [ "Exploit", ], url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { name: "[png-mng-announce] 20141222 libpng-1.5.21 and 1.6.16 are available", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "http://sourceforge.net/p/png-mng/mailman/message/33173461/", }, { name: "62725", refsource: "SECUNIA", tags: [ "Permissions Required", "Third Party Advisory", ], url: "http://secunia.com/advisories/62725", }, { name: "https://support.apple.com/HT206167", refsource: "CONFIRM", tags: [ "Vendor Advisory", ], url: "https://support.apple.com/HT206167", }, { name: "APPLE-SA-2016-03-21-5", refsource: "APPLE", tags: [ "Vendor Advisory", ], url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, }, lastModifiedDate: "2016-10-20T18:46Z", publishedDate: "2015-01-18T18:59Z", }, }, }
ghsa-5gg5-9r5r-wpgh
Vulnerability from github
Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
{ affected: [], aliases: [ "CVE-2015-0973", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2015-01-18T18:59:00Z", severity: "HIGH", }, details: "Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.", id: "GHSA-5gg5-9r5r-wpgh", modified: "2024-07-19T15:31:45Z", published: "2022-05-17T03:47:52Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2015-0973", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20240719-0005", }, { type: "WEB", url: "https://support.apple.com/HT206167", }, { type: "WEB", url: "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html", }, { type: "WEB", url: "http://secunia.com/advisories/62725", }, { type: "WEB", url: "http://sourceforge.net/p/png-mng/mailman/message/33173461", }, { type: "WEB", url: "http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2015/01/10/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2015/01/10/3", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", }, ], schema_version: "1.4.0", severity: [], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.