fkie_cve-2008-3964
Vulnerability from fkie_nvd
Published
2008-09-11 01:13
Modified
2024-11-21 00:50
Severity ?
Summary
Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.
References
cve@mitre.orghttp://secunia.com/advisories/31781Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/33137Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/35302Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/35386Third Party Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200812-15.xmlThird Party Advisory
cve@mitre.orghttp://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implementThird Party Advisory
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517Product, Third Party Advisory
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=624518Broken Link, Patch
cve@mitre.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624Exploit, Third Party Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1Broken Link
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1Broken Link
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2009-208.htmThird Party Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/889484Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:051Broken Link
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/09/3Mailing List, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/09/09/8Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/31049Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2512Permissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1462Permissions Required
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1560Permissions Required
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44928Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31781Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33137Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35302Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35386Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200812-15.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implementThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517Product, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=624518Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2009-208.htmThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/889484Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:051Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/09/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/09/09/8Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31049Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2512Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1462Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1560Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44928Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
libpng libpng *
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0
libpng libpng 1.4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F293C5F-122C-49DA-880A-BA95EE79A42A",
              "versionEndExcluding": "1.2.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F44C0B27-5D6D-41E4-8EA9-F6F88D347C44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "FE5DEC4E-76F7-486C-B4E0-F3D88695A9E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "BC4807AA-BCD3-45D0-9C1D-4B8AD878B327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "F257A4AC-6B13-4D67-B168-AD5BF28962DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta13:*:*:*:*:*:*",
              "matchCriteriaId": "11DDEF8A-B308-46A2-B368-C46688C3E54B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta14:*:*:*:*:*:*",
              "matchCriteriaId": "3426A085-E295-47A5-8D2F-C55451EB89BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta15:*:*:*:*:*:*",
              "matchCriteriaId": "74E87513-DA93-4AE0-89FB-08902997810A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta16:*:*:*:*:*:*",
              "matchCriteriaId": "97187A00-2680-45AA-AAE7-F16DD01957AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta17:*:*:*:*:*:*",
              "matchCriteriaId": "14A3D8E7-AE1E-4D4E-9B9F-98CC50AF984C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta18:*:*:*:*:*:*",
              "matchCriteriaId": "2C517B08-4D43-457D-BD00-6920CF2924B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta19:*:*:*:*:*:*",
              "matchCriteriaId": "C7FC9A8E-0CE8-4B9F-AFFF-D8AFC16013AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "68658B69-A70B-4982-8E14-57202F8DA03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta20:*:*:*:*:*:*",
              "matchCriteriaId": "7CD59594-E67B-460E-A8A7-1A2A57187050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta21:*:*:*:*:*:*",
              "matchCriteriaId": "52510ECE-10CB-4F8B-827E-8DB1784EA1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta22:*:*:*:*:*:*",
              "matchCriteriaId": "1EF398FE-E664-460A-9B21-4B0C454A053F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta23:*:*:*:*:*:*",
              "matchCriteriaId": "89799F7C-B866-4647-8A56-302F1E006506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta24:*:*:*:*:*:*",
              "matchCriteriaId": "E43A4742-A419-49FA-9F60-F6E77E4D2870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta25:*:*:*:*:*:*",
              "matchCriteriaId": "4880A92D-3A86-451C-8995-54068FBB1B0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta26:*:*:*:*:*:*",
              "matchCriteriaId": "C7B88A47-4E4C-49E6-978C-468530C87C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta27:*:*:*:*:*:*",
              "matchCriteriaId": "336375B9-8B1C-46F1-A512-4EE631A1E18F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta28:*:*:*:*:*:*",
              "matchCriteriaId": "E7229CC7-A325-4C68-BD76-BEE198E09F0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta29:*:*:*:*:*:*",
              "matchCriteriaId": "43803CBE-A2F4-40EC-97EB-63526240D5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "8F0F7323-986F-4E3A-AA8C-BDBFA2B53F05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta30:*:*:*:*:*:*",
              "matchCriteriaId": "626FEAE3-ABDE-4E50-9549-6C2D4415EF5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta31:*:*:*:*:*:*",
              "matchCriteriaId": "AF5EE51D-586A-4454-B746-8A18FFA84005",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta32:*:*:*:*:*:*",
              "matchCriteriaId": "CCF71D7A-5B9B-4973-9143-D3625383A3F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta33:*:*:*:*:*:*",
              "matchCriteriaId": "6129A9F4-343E-4DCB-B252-DA0744A7C5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "1D4C2F83-2302-43B3-8DB7-EA4DD7D75283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C88C4762-4EBE-442D-9154-89EFD8654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "1E512280-AC4B-401D-A499-A460AD1F2C99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "76C52B6B-9CCB-458C-ABF9-5E334ABB107B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "84EE5F48-E15F-4CE9-84F3-9859F72D9651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "35B244AD-138C-406D-99F4-E33BDF87BFA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de entero en libpng versiones anteriores a 1.2.32beta01, y 1.4 versiones anteriores a 1.4.0beta34, permiten a atacantes dependientes de contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) o tener otros impactos desconocidos a trav\u00e9s de una imagen PNG con fragmentos zTXt manipulados, relacionado con (1) la funci\u00f3n png_push_read_zTXt en pngread.c, y posiblemente relacionado con (2) pngtest.c."
    }
  ],
  "id": "CVE-2008-3964",
  "lastModified": "2024-11-21T00:50:35.390",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-09-11T01:13:47.633",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31781"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/33137"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35302"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35386"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200812-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com\u0026forum_name=png-mng-implement"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?group_id=5624\u0026release_id=624517"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=624518"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2095669\u0026group_id=5624\u0026atid=105624"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/889484"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31049"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2512"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1462"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1560"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/33137"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35386"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200812-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com\u0026forum_name=png-mng-implement"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?group_id=5624\u0026release_id=624517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=624518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2095669\u0026group_id=5624\u0026atid=105624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/889484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/09/09/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1462"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44928"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues did not affect the versions of libpng as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2017-08-07T21:32:18.343",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-193"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.