4.3
CVSSv2

CVE-2007-5266

Published: 08/10/2007 Updated: 26/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng prior to 1.0.29 beta1 and 1.2.x prior to 1.2.21 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image that prevents a name field from being NULL terminated.

Affected Products

Vendor Product Versions
LibpngLibpng1.0.28, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15, 1.2.16, 1.2.17, 1.2.18, 1.2.19, 1.2.20

Mailing Lists

Core Security Technologies Advisory - Google's Android SDK suffers from heap and integer overflow vulnerabilities Proof of concept code included ...

References

CWE-189http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.htmlhttp://bugs.gentoo.org/show_bug.cgi?id=195261http://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008//May/msg00001.htmlhttp://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/27284http://secunia.com/advisories/27529http://secunia.com/advisories/27629http://secunia.com/advisories/27746http://secunia.com/advisories/29420http://secunia.com/advisories/30161http://secunia.com/advisories/30430http://secunia.com/advisories/35302http://secunia.com/advisories/35386http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.520323http://sourceforge.net/mailarchive/forum.php?thread_name=5122753600C3E94F87FBDFFCC090D1FF0400EA68%40MERCMBX07.na.sas.com&forum_name=png-mng-implementhttp://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0709140846k24e9a040r81623783b6b1c00f%40mail.gmail.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1http://support.avaya.com/elmodocs2/security/ASA-2009-208.htmhttp://www.coresecurity.com/?action=item&id=2148http://www.gentoo.org/security/en/glsa/glsa-200711-08.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200805-07.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:217http://www.securityfocus.com/archive/1/483582/100/0/threadedhttp://www.securityfocus.com/archive/1/489135/100/0/threadedhttp://www.securityfocus.com/bid/25957http://www.us-cert.gov/cas/techalerts/TA08-150A.htmlhttp://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2008/1697http://www.vupen.com/english/advisories/2009/1462http://www.vupen.com/english/advisories/2009/1560https://issues.rpath.com/browse/RPL-1814https://www.rapid7.com/db/vulnerabilities/apple-osx-imageio-cve-2007-5266https://nvd.nist.govhttps://packetstormsecurity.com/files/64260/Core-Security-Technologies-Advisory-2008.0124.htmlhttps://www.rapid7.com/db/vulnerabilities/apple-osx-x11-cve-2007-5267