4.3
CVSSv2

CVE-2007-5268

Published: 08/10/2007 Updated: 26/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

pngrtran.c in libpng prior to 1.0.29 and 1.2.x prior to 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote malicious users to cause a denial of service (crash) via a crafted PNG image.

Vulnerable Product Search on Vulmon Subscribe to Product

libpng libpng

canonical ubuntu linux 6.10

canonical ubuntu linux 6.06

canonical ubuntu linux 7.10

canonical ubuntu linux 7.04

Vendor Advisories

It was discovered that libpng did not properly perform bounds checking in certain operations An attacker could send a specially crafted PNG image and cause a denial of service in applications linked against libpng This issue only affected Ubuntu 804 LTS (CVE-2007-5268, CVE-2007-5269) ...
It was discovered that libpng did not properly perform bounds checking and comparisons in certain operations An attacker could send a specially crafted PNG image and cause a denial of service in applications linked against libpng ...

Exploits

Core Security Technologies Advisory - Google's Android SDK suffers from heap and integer overflow vulnerabilities Proof of concept code included ...

References

NVD-CWE-noinfohttp://sourceforge.net/mailarchive/message.php?msg_name=5122753600C3E94F87FBDFFCC090D1FF0400EBC5%40MERCMBX07.na.sas.comhttp://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0709140846k24e9a040r81623783b6b1c00f%40mail.gmail.comhttp://sourceforge.net/mailarchive/forum.php?thread_name=3.0.6.32.20071004082318.012a7628%40mail.comcast.net&forum_name=png-mng-implementhttp://secunia.com/advisories/27093https://issues.rpath.com/browse/RPL-1814http://bugs.gentoo.org/show_bug.cgi?id=195261http://www.gentoo.org/security/en/glsa/glsa-200711-08.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:217http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.520323http://www.ubuntu.com/usn/usn-538-1http://www.securityfocus.com/bid/25956http://secunia.com/advisories/27284http://secunia.com/advisories/27405http://secunia.com/advisories/27529http://secunia.com/advisories/27629http://secunia.com/advisories/27746http://www.coresecurity.com/?action=item&id=2148http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.htmlhttp://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://www.gentoo.org/security/en/glsa/glsa-200805-07.xmlhttp://secunia.com/advisories/30161http://lists.apple.com/archives/security-announce/2008//May/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-150A.htmlhttp://secunia.com/advisories/30430http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1http://www.vupen.com/english/advisories/2009/1462http://secunia.com/advisories/35302http://support.avaya.com/elmodocs2/security/ASA-2009-208.htmhttp://secunia.com/advisories/35386http://www.vupen.com/english/advisories/2009/1560http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1http://www.vupen.com/english/advisories/2008/1697http://www.vupen.com/english/advisories/2007/3390http://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.securityfocus.com/archive/1/489135/100/0/threadedhttp://www.securityfocus.com/archive/1/483582/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/730-1/