fkie_cve-2015-8472
Vulnerability from fkie_nvd
Published
2016-01-21 15:59
Modified
2024-11-21 02:38
Severity ?
Summary
Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C6DA6A-9C87-4B7B-A52D-A66276B5DE82", "versionEndIncluding": "10.11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "BBD67FEF-E6D3-449B-B2E9-14A69AD8E923", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C036011A-9AE1-423C-8B73-188B9BA20FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8051459E-94D3-4D4A-9D40-CC9475DDB00C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "42056C63-69A7-43CF-828C-0C3E365702D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B6A39A3-7F86-4DC3-B248-859630AFB9A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "9A3E3BF3-4376-4692-A515-A7B6593F28F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "3B1AC712-110D-458F-B650-930C6D45CA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "7F848FA5-9682-454F-A9DE-671C4401F15F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "C4B83678-98A1-440E-950C-4A27995C7294", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "FB9EEE31-479A-4370-BF00-C26C1AF502B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "95EABD7D-1F18-4FA5-BAA9-F8D69129E531", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65B836CA-3740-48B0-966B-21E65EF3D636", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "3988FA1B-18D9-46AA-87BA-A6B01D4F4B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "51A46409-7AC6-45DB-B92D-29988C445BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "09E2B608-6C70-446F-A3A7-369048D99855", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "5AA00AE0-F447-4361-AA37-0C98BDE491E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "220A02AF-6ADA-4B75-BC81-40B2D847029A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "ECEB8F61-195E-41DE-90CE-22854055E9D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "111091B9-CBAE-4FC7-8B97-7D2345BFCB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "54C6D9D3-50B2-4A63-B3D1-C76C70F4443E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "4110AA74-C69D-45BC-A630-9EE3A2036BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "1CAA1090-C1C7-43A2-BD44-065572D226B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "2FD92305-91BF-4984-A029-8FA83CBF1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "31EE280F-D76D-478B-ADD6-D5F2C7574A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*", "matchCriteriaId": "747314F7-A515-41FF-8095-62A9F05F0DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*", "matchCriteriaId": "C1BE9ED0-685B-41F0-A984-D33E7034AEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*", "matchCriteriaId": "E3F6AD99-7697-47E5-8301-723C16535C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*", "matchCriteriaId": "07B00AD3-D13C-45B5-A13A-9092D40F4A63", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*", "matchCriteriaId": "14222EA8-E8ED-4818-ACB4-C6A13643F210", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*", "matchCriteriaId": "A22C28DD-5C99-4722-9093-A1E82A2C2808", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*", "matchCriteriaId": "93714B71-6331-4F5A-A12A-B4B80CA2FEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*", "matchCriteriaId": "10CD562E-1F06-4779-A29C-4069E3C86B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*", "matchCriteriaId": "4D83D507-64AF-4158-97B9-1353E2F8EE46", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*", "matchCriteriaId": "BC5E39EA-C32E-4E87-9A3F-CCB5144F0E68", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*", "matchCriteriaId": "0DF6249D-5AA8-4EA3-A92A-0E492FE5B811", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*", "matchCriteriaId": "CDE7F259-40A2-4866-8EF8-44A9913EC4EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*", "matchCriteriaId": "03C20A42-6A77-43D4-80D7-332BB2DF1B66", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*", "matchCriteriaId": "D4CC5DBB-249B-4EED-9F54-E23CB1919ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*", "matchCriteriaId": "088A1BDB-BB1A-46B5-898B-23311DE27CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.49:*:*:*:*:*:*:*", "matchCriteriaId": "6CBAA828-F42A-420F-B17E-6FACF6CD483D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.50:*:*:*:*:*:*:*", "matchCriteriaId": "D20664A4-4816-4F57-82BB-F4116FA33A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.51:*:*:*:*:*:*:*", "matchCriteriaId": "64226521-0723-4259-B214-0D2A35CF5FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.52:*:*:*:*:*:*:*", "matchCriteriaId": "6ABEEBFE-A8C8-40D4-97D8-F06676E67478", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.53:*:*:*:*:*:*:*", "matchCriteriaId": "47831D80-33AC-4A13-B92D-3D2CBF215955", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.2.54:*:*:*:*:*:*:*", "matchCriteriaId": "7ED428C8-E6AB-4BB1-BE7D-543B2A19410F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "52D5DAA1-3632-48D7-A657-4A4C83A119D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB5AE8E0-3C11-4EE1-A599-4D70C6A13F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6AD36C3B-3C02-488B-B480-EA091D702CA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "59BAD272-D4B6-40CE-B5E9-63145E12B638", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5EEB311C-766D-4070-A0BE-9CE4593C8F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "C185BF59-68E4-49F8-802F-C06FE840FF3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C399B31-B8EC-41C4-B6AB-83BABC474374", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3B00AF5F-D4F5-490C-8BF4-2B33EFBF15A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "BA9AEB1D-0AA7-4842-9CF9-91BFD8B58A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "09150152-5DEA-4FA2-9163-63EAF4D83DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "45E5068A-42BE-478B-8C00-FE23B7837DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "023CCFB0-7995-408E-928A-76C5BD9B4924", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "493F615D-DB81-48B3-9E74-C32544A01372", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "D2F12925-44F7-4790-8A06-345EB3DCCB71", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "7F5BF226-D62F-4F54-B771-EB108FD256FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "D2EDBFCB-96DA-4A36-873A-3164975BE997", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "ACDB15BE-BDD2-4210-B224-A520E8DC7D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "70D3AD38-CCE7-47E6-8225-C0BFC3F10E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE8BC209-45B9-44D6-A26D-0B570ED5BB19", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "6644ED2F-66F3-469D-8233-72FE7321E850", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "5AF0E757-9E9C-4022-B32D-3F0E9C815FAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "3F34978D-6ABE-463E-AB48-21CC55B7D157", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "7A4568BB-F5FF-4BBB-9DA3-E66C2BFA2416", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "246CF13F-FDC1-499E-9FC1-5624D54E9E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC66FD43-421B-4223-BA32-EC47B51E1091", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "F0F5664B-5AB9-4DE4-99AA-8FD32DBA4A4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "C7712376-D776-4814-A041-FBFEAC70ADC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "103E5ECE-126B-4C93-A3C8-979DCCA4EB5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "65DEDF02-9239-497C-94DB-DAF80B6B4F6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "8CAAECD8-0C16-40CC-BA8A-97DF38BAF668", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "84D9B3E6-D32D-4E4B-908A-39FAC3D5F618", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "8F2DB1EF-B961-4C56-8519-242419B6AB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "2BDE2351-2B17-4C1A-A625-6C7DE691039A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "5426F3F0-CF21-45D4-9071-F8F7865A7619", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "25147E8F-7385-4393-BE21-E3347610F003", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "19C06F50-7C48-4FD6-B0C9-6C9B643742B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "DA562433-F6F5-46C1-98DE-8309BD940260", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CD684587-0D7E-411F-B9E3-14CBE4954499", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "5AB9178D-DEEF-4D2C-9347-F553312129C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "3157A738-20EB-4BE0-A58B-E21DDA64EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.23:*:*:*:*:*:*:*", "matchCriteriaId": "6D70C6B1-2360-48C9-931D-BAED79151DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.5.24:*:*:*:*:*:*:*", "matchCriteriaId": "29F79896-3EF0-4F53-8EBC-66D811E2C315", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7A0D174-F35C-488B-8577-00EFB7741089", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "9EDC5DA5-F2A7-4819-BB9D-258EB9AB7857", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "27B34D78-C0BC-45DC-AD84-F5F13451ED7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3D3A7EC-774C-423F-BDE1-CDCB9433D87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "0B898B95-CF41-4813-8FE7-776BD59A6A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F5E5899-5A3F-49A1-B18C-4C97566B87BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "C7897EEC-DE43-485A-B2CD-E8623A6D2C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "ACC16FE2-E94E-45B9-94F0-B6434B21DD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DAE31-CCA9-450D-90E5-B8F0490FB944", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "52FEB5C9-0C13-4FD6-876C-AAE7ED4E986C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "2337F9F3-D26D-4A24-880A-800CD5C16795", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "31F71BA3-5402-448E-9068-EB0DCA1D62EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "5418D311-FC7D-4B46-950B-17094775D9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "AD67323A-8463-4B8F-B370-40C2ACFF4D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "2BBA4F43-0FD0-4D7D-84A0-37C8E79B9B29", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "71E01CC8-1C29-4C46-8213-B48A2364CE8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "89FCEBCA-0AFB-42FB-9BB5-CB4EE7C38336", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "62B29838-8B2F-41AA-A654-58255C4D1EC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "480007D1-0121-4966-9995-9E491848681A", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "162CF84D-0B1B-4920-B2F8-C812CA3DF18B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126." }, { "lang": "es", "value": "Desbordamiento de buffer en la funci\u00f3n png_set_PLTE en libpng en versiones anteriores a 1.0.65, 1.1.x y 1.2.x en versiones anteriores a 1.2.55, 1.3.x, 1.4.x en versiones anteriores a 1.4.18, 1.5.x en versiones anteriores a 1.5.25 y 1.6.x en versiones anteriores a 1.6.20 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente tener otro impacto no especificado a trav\u00e9s de un valor peque\u00f1o de profundidad de bits en un IHDR (tambi\u00e9n conocido como image header) fragmento en una imagen PNG. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incorrecta para CVE-2015-8126." } ], "id": "CVE-2015-8472", "lastModified": "2024-11-21T02:38:36.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-21T15:59:00.117", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-2594.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-2595.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-2596.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2016/dsa-3443" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/12/03/6" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/78624" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "source": "cve@mitre.org", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10148" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-2594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-2595.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-2596.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/12/03/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/78624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206167" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.