cve-2011-3048
Vulnerability from cvelistv5
Published
2012-05-29 20:00
Modified
2024-08-06 23:22
Severity ?
Summary
The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
References
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2012-0523.html
cve@mitre.orghttp://secunia.com/advisories/48587Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/48644Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/48665Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/48721Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/48983Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/49660
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201206-15.xml
cve@mitre.orghttp://support.apple.com/kb/HT5501
cve@mitre.orghttp://support.apple.com/kb/HT5503
cve@mitre.orghttp://ubuntu.com/usn/usn-1417-1
cve@mitre.orghttp://www.debian.org/security/2012/dsa-2446
cve@mitre.orghttp://www.libpng.org/pub/png/libpng.htmlVendor Advisory
cve@mitre.orghttp://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2012:046
cve@mitre.orghttp://www.osvdb.org/80822
cve@mitre.orghttp://www.securityfocus.com/bid/52830
cve@mitre.orghttp://www.securitytracker.com/id?1026879
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/74494
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-0523.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48587Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48644Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48665Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48721Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48983Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49660
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-15.xml
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5501
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5503
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1417-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2446
af854a3a-2127-422b-91ae-364da2661108http://www.libpng.org/pub/png/libpng.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:046
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/80822
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52830
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026879
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/74494
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:22:27.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49660",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49660"
          },
          {
            "name": "48983",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48983"
          },
          {
            "name": "RHSA-2012:0523",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html"
          },
          {
            "name": "libpng-pngsettext2-code-execution(74494)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494"
          },
          {
            "name": "APPLE-SA-2012-09-19-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5503"
          },
          {
            "name": "52830",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52830"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt"
          },
          {
            "name": "DSA-2446",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2446"
          },
          {
            "name": "GLSA-201206-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
          },
          {
            "name": "MDVSA-2012:046",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046"
          },
          {
            "name": "48587",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48587"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.libpng.org/pub/png/libpng.html"
          },
          {
            "name": "80822",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/80822"
          },
          {
            "name": "FEDORA-2012-5526",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html"
          },
          {
            "name": "48644",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48644"
          },
          {
            "name": "FEDORA-2012-5079",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html"
          },
          {
            "name": "APPLE-SA-2012-09-19-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5501"
          },
          {
            "name": "FEDORA-2012-5515",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html"
          },
          {
            "name": "FEDORA-2012-5080",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html"
          },
          {
            "name": "1026879",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026879"
          },
          {
            "name": "FEDORA-2012-5518",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html"
          },
          {
            "name": "48665",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48665"
          },
          {
            "name": "FEDORA-2012-4902",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html"
          },
          {
            "name": "48721",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48721"
          },
          {
            "name": "USN-1417-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1417-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "49660",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49660"
        },
        {
          "name": "48983",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48983"
        },
        {
          "name": "RHSA-2012:0523",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html"
        },
        {
          "name": "libpng-pngsettext2-code-execution(74494)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494"
        },
        {
          "name": "APPLE-SA-2012-09-19-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5503"
        },
        {
          "name": "52830",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52830"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt"
        },
        {
          "name": "DSA-2446",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2446"
        },
        {
          "name": "GLSA-201206-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
        },
        {
          "name": "MDVSA-2012:046",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046"
        },
        {
          "name": "48587",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48587"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.libpng.org/pub/png/libpng.html"
        },
        {
          "name": "80822",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/80822"
        },
        {
          "name": "FEDORA-2012-5526",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html"
        },
        {
          "name": "48644",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48644"
        },
        {
          "name": "FEDORA-2012-5079",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html"
        },
        {
          "name": "APPLE-SA-2012-09-19-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5501"
        },
        {
          "name": "FEDORA-2012-5515",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html"
        },
        {
          "name": "FEDORA-2012-5080",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html"
        },
        {
          "name": "1026879",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026879"
        },
        {
          "name": "FEDORA-2012-5518",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html"
        },
        {
          "name": "48665",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48665"
        },
        {
          "name": "FEDORA-2012-4902",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html"
        },
        {
          "name": "48721",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48721"
        },
        {
          "name": "USN-1417-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1417-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3048",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49660",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49660"
            },
            {
              "name": "48983",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48983"
            },
            {
              "name": "RHSA-2012:0523",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html"
            },
            {
              "name": "libpng-pngsettext2-code-execution(74494)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494"
            },
            {
              "name": "APPLE-SA-2012-09-19-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5503",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5503"
            },
            {
              "name": "52830",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52830"
            },
            {
              "name": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt",
              "refsource": "CONFIRM",
              "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt"
            },
            {
              "name": "DSA-2446",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2446"
            },
            {
              "name": "GLSA-201206-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml"
            },
            {
              "name": "MDVSA-2012:046",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046"
            },
            {
              "name": "48587",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48587"
            },
            {
              "name": "http://www.libpng.org/pub/png/libpng.html",
              "refsource": "CONFIRM",
              "url": "http://www.libpng.org/pub/png/libpng.html"
            },
            {
              "name": "80822",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/80822"
            },
            {
              "name": "FEDORA-2012-5526",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html"
            },
            {
              "name": "48644",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48644"
            },
            {
              "name": "FEDORA-2012-5079",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html"
            },
            {
              "name": "APPLE-SA-2012-09-19-2",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5501",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5501"
            },
            {
              "name": "FEDORA-2012-5515",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html"
            },
            {
              "name": "FEDORA-2012-5080",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html"
            },
            {
              "name": "1026879",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026879"
            },
            {
              "name": "FEDORA-2012-5518",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html"
            },
            {
              "name": "48665",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48665"
            },
            {
              "name": "FEDORA-2012-4902",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html"
            },
            {
              "name": "48721",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48721"
            },
            {
              "name": "USN-1417-1",
              "refsource": "UBUNTU",
              "url": "http://ubuntu.com/usn/usn-1417-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3048",
    "datePublished": "2012-05-29T20:00:00",
    "dateReserved": "2011-08-09T00:00:00",
    "dateUpdated": "2024-08-06T23:22:27.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-3048\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-05-29T20:55:04.993\",\"lastModified\":\"2024-11-21T01:29:35.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n png_set_text_2 en pngset.c en libpng v1.0.x anterior a v1.0.59, v1.2.x anterior a v1.2.49, v1.4.x anterior a v1.4.11, y v1.5.x anterior a v1.5.10 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bloqueo) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de un chunk de  texto manipulado en un archivo de imagen PNG, provocando un error de asignaci\u00f3n de memoria que no se manipula correctamente, dando lugar a un desbordamiento de b\u00fafer basado en memoria din\u00e1mica.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29050958-EFD8-4A79-9022-EF72AAD4EDB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CB33B1-71B2-4235-A2C1-FCAEA9844A6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436F8C71-1780-4DC6-937B-8F1F51C7453D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B79DC5F-5062-4031-BA11-746EE3C8E1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F2B503-1516-465D-A558-9932BDB3457D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA94EAAA-A4D2-4E36-BC69-BBE9644FE970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A7C96C-8FBB-42B4-937E-3321C939CC87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94084356-D39B-41B2-AC24-0ADAD0BF5988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086C6335-7872-46A7-AEB1-9BE5AE5A788C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8233B1-04A0-4E25-97EE-CF466B48A12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA714E7E-05EF-4598-9324-887BC66C675E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CF3B73-D3B9-4D76-B411-C837BCE0806E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1752D91-3468-4E22-B60F-6789B3CBD7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93E210A7-489B-4EA7-A840-599523157DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B37565FA-72F5-4063-8D7A-97BC269F020B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8FA821-818E-4BC7-834B-94EB5C042390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FBF3D3-95A6-4869-8A69-F0E5ECA40220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07785D0-E995-4208-AB8C-43B320D291F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BBA666-4473-4C6D-BF48-34EF3F09AD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2763A6C7-DBBA-4E2A-917C-B6FF524B9891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DECDF8-7742-4D58-99FA-100A01748B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4FD3B1-3A68-4122-AA50-31BFC6C50408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45790331-CE26-457F-8649-F027703E73EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0BFE2D-5C7B-42E0-B783-8C5907CA8635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD993C1-70B6-4ACB-B958-94E7EF973A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C085686C-A0AA-4F56-9E7D-B5CB24B890D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02A5197-06B9-469E-9817-45BB23324042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB6BE37-E564-4E42-BE39-36DD301C37A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314209F2-E0A0-4045-8108-8E7215312442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A8ECBB-7E50-4447-88E2-893C1466C251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8F24A5-F5C3-495F-9AF0-2EE836E0147A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46DE2DE3-F081-4B80-A4DA-C5AB27B3CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EF1D77-7838-47DF-B6A2-DBBAC0058FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76BA4FEA-FEB4-47A9-9DFF-A233CEE03D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DB5A63-E89E-48AB-A846-107EBEC71D67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2181FEEB-D07E-490C-9953-3490D87B63A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DC41DD-A291-4ECE-84B9-574828AA2A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015D1E36-17A1-4413-B1FB-5DF4C36712BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64CE8F2-22B1-43F8-8934-CBCD2EFBA85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB15BE8-1B88-4117-AF14-3AA2B54DB323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2CB2728-4CC7-46EA-809B-450A9BB9F884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96638963-D264-49AD-9B77-497C3DA23DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88544BBE-29A1-4622-B3E6-FA4B891A9B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD658D98-9A4D-4DC2-A935-BB3BF0E0FB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF819AF-AC11-4BD9-A070-572836A65FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEAC62D-BF2B-40DF-9428-FFBF7CA09471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"27DFAB04-5C5C-4366-B3FC-C83AAB807F0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36327723-F953-4BD3-A525-930DDCF7931D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F717B1-CC02-4878-9A78-1584074E81C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D482811-2EF1-47AE-A41C-7532AC6DEF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF26AB67-81F8-4CD2-8E28-BDF9FE2CD58F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0EE98D-0596-4147-9EC4-F3616BF2B901\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C036011A-9AE1-423C-8B73-188B9BA20FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8051459E-94D3-4D4A-9D40-CC9475DDB00C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42056C63-69A7-43CF-828C-0C3E365702D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6A39A3-7F86-4DC3-B248-859630AFB9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58377AE3-1C13-4C3F-BC55-8336DAEEF97F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005C2DA4-D00E-4206-851E-9226D66B5F2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B17602-0D97-469B-A9B1-30AAC8F758F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857B664A-C6F9-45E3-93EA-C0F53CEF5C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFDA458-74E8-4DEF-B524-A4A8672CB66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3E3BF3-4376-4692-A515-A7B6593F28F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1AC712-110D-458F-B650-930C6D45CA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F848FA5-9682-454F-A9DE-671C4401F15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B83678-98A1-440E-950C-4A27995C7294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9EEE31-479A-4370-BF00-C26C1AF502B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EABD7D-1F18-4FA5-BAA9-F8D69129E531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B836CA-3740-48B0-966B-21E65EF3D636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3988FA1B-18D9-46AA-87BA-A6B01D4F4B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A46409-7AC6-45DB-B92D-29988C445BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E2B608-6C70-446F-A3A7-369048D99855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA00AE0-F447-4361-AA37-0C98BDE491E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"220A02AF-6ADA-4B75-BC81-40B2D847029A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEB8F61-195E-41DE-90CE-22854055E9D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"111091B9-CBAE-4FC7-8B97-7D2345BFCB45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54C6D9D3-50B2-4A63-B3D1-C76C70F4443E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4110AA74-C69D-45BC-A630-9EE3A2036BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CAA1090-C1C7-43A2-BD44-065572D226B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD92305-91BF-4984-A029-8FA83CBF1A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31EE280F-D76D-478B-ADD6-D5F2C7574A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747314F7-A515-41FF-8095-62A9F05F0DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BE9ED0-685B-41F0-A984-D33E7034AEA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F6AD99-7697-47E5-8301-723C16535C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B00AD3-D13C-45B5-A13A-9092D40F4A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14222EA8-E8ED-4818-ACB4-C6A13643F210\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22C28DD-5C99-4722-9093-A1E82A2C2808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93714B71-6331-4F5A-A12A-B4B80CA2FEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CD562E-1F06-4779-A29C-4069E3C86B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D83D507-64AF-4158-97B9-1353E2F8EE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC5E39EA-C32E-4E87-9A3F-CCB5144F0E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B9103F-CD72-4F06-BED1-7AE4AB9E672C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF6249D-5AA8-4EA3-A92A-0E492FE5B811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE7F259-40A2-4866-8EF8-44A9913EC4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA3EED5-F0AB-4C5C-92D7-B84BFDAA31AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C20A42-6A77-43D4-80D7-332BB2DF1B66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0A1B56-0E92-4E81-9B2C-4F9B9D5833EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CC5DBB-249B-4EED-9F54-E23CB1919ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C10D9119-0FF8-4DFE-8632-A14D9C83CC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088A1BDB-BB1A-46B5-898B-23311DE27CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24CA735-6EA6-41E3-A82D-D443BB47806B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D5DAA1-3632-48D7-A657-4A4C83A119D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5AE8E0-3C11-4EE1-A599-4D70C6A13F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD36C3B-3C02-488B-B480-EA091D702CA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BAD272-D4B6-40CE-B5E9-63145E12B638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EEB311C-766D-4070-A0BE-9CE4593C8F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C185BF59-68E4-49F8-802F-C06FE840FF3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C399B31-B8EC-41C4-B6AB-83BABC474374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B00AF5F-D4F5-490C-8BF4-2B33EFBF15A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9AEB1D-0AA7-4842-9CF9-91BFD8B58A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09150152-5DEA-4FA2-9163-63EAF4D83DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E5068A-42BE-478B-8C00-FE23B7837DC1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BA2974-AF9F-4382-B443-F54354B5623A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE8BC209-45B9-44D6-A26D-0B570ED5BB19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"468B1A0E-AF58-42C4-9801-D6F83F283360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6644ED2F-66F3-469D-8233-72FE7321E850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36D610D-F86A-4D46-B0F2-884FFA601C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A976DD-87FA-425D-8E07-E3CFC4D3FD05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34978D-6ABE-463E-AB48-21CC55B7D157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"3716FF0E-AD20-46F8-B8F6-3EC42D427C90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4568BB-F5FF-4BBB-9DA3-E66C2BFA2416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5300EC4-B3A0-42C5-8D39-67AB75C47153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246CF13F-FDC1-499E-9FC1-5624D54E9E3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5840A8E-AB64-40A9-8BB6-EB6BA51D40B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC66FD43-421B-4223-BA32-EC47B51E1091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEC9D57C-47F2-4773-85B6-FFB0C4681E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F5664B-5AB9-4DE4-99AA-8FD32DBA4A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD1C8E6-DF35-47F7-877F-001AD62B57CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7712376-D776-4814-A041-FBFEAC70ADC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF69B34E-F7FB-4F4C-AF7D-ACD165B1233B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7CC2E64-E48C-4DE6-892D-06A0B806A51B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0523.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/48587\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48644\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48665\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48721\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48983\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49660\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-15.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://ubuntu.com/usn/usn-1417-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2446\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.libpng.org/pub/png/libpng.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:046\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/80822\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/52830\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1026879\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74494\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0523.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48587\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://ubuntu.com/usn/usn-1417-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2446\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.libpng.org/pub/png/libpng.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/80822\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/52830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/74494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.