5
CVSSv2

CVE-2007-2445

Published: 16/05/2007 Updated: 16/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The png_handle_tRNS function in pngrutil.c in libpng prior to 1.0.25 and 1.2.x prior to 1.2.17 allows remote malicious users to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.

Vulnerable Product Search on Vulmon Subscribe to Product

png_reference_library libpng

Vendor Advisories

It was discovered that libpng did not correctly handle corrupted CRC in grayscale PNG images By tricking a user into opening a specially crafted PNG, a remote attacker could cause the application using libpng to crash, resulting in a denial of service ...
Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2445 Grayscale PNG files containing invalid tRNS chunk CRC values could cause a denial of service (crash), if a maliciously ...
Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2445 The png_handle_tRNS function allows attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk C ...

Exploits

Core Security Technologies Advisory - Google's Android SDK suffers from heap and integer overflow vulnerabilities Proof of concept code included ...

References

NVD-CWE-noinfohttp://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txthttp://www.kb.cert.org/vuls/id/684664http://secunia.com/advisories/25292https://issues.rpath.com/browse/RPL-1381http://openpkg.com/go/OpenPKG-SA-2007.013http://www.redhat.com/support/errata/RHSA-2007-0356.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650http://www.securityfocus.com/bid/24000http://www.securityfocus.com/bid/24023http://www.securitytracker.com/id?1018078http://secunia.com/advisories/25329http://secunia.com/advisories/25268http://secunia.com/advisories/25273http://support.avaya.com/elmodocs2/security/ASA-2007-254.htmhttp://irrlicht.sourceforge.net/changes.txthttp://www.gentoo.org/security/en/glsa/glsa-200705-24.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:116http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1http://www.novell.com/linux/security/advisories/2007_13_sr.htmlhttp://www.trustix.org/errata/2007/0019/http://www.ubuntu.com/usn/usn-472-1http://secunia.com/advisories/25353http://secunia.com/advisories/25461http://secunia.com/advisories/25554http://secunia.com/advisories/25571http://secunia.com/advisories/25742http://secunia.com/advisories/25867http://secunia.com/advisories/27056http://secunia.com/advisories/25787http://www.coresecurity.com/?action=item&id=2148http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1http://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://www.gentoo.org/security/en/glsa/glsa-200805-07.xmlhttp://secunia.com/advisories/30161http://www.debian.org/security/2008/dsa-1613http://secunia.com/advisories/31168http://www.debian.org/security/2009/dsa-1750http://secunia.com/advisories/34388http://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2007/1838http://www.vupen.com/english/advisories/2007/2385http://osvdb.org/36196https://exchange.xforce.ibmcloud.com/vulnerabilities/34340https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094http://www.securityfocus.com/archive/1/489135/100/0/threadedhttp://www.securityfocus.com/archive/1/468910/100/0/threadedhttps://usn.ubuntu.com/472-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/684664