7.5
CVSSv2

CVE-2008-1382

Published: 14/04/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

libpng 1.0.6 up to and including 1.0.32, 1.2.0 up to and including 1.2.26, and 1.4.0beta01 up to and including 1.4.0beta19 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libpng libpng 1.0.12

libpng libpng 1.0.15

libpng libpng 1.0.16

libpng libpng 1.0.19

libpng libpng 1.0.20

libpng libpng 1.0.23

libpng libpng 1.0.25

libpng libpng 1.0.26

libpng libpng 1.0.27

libpng libpng 1.0.28

libpng libpng 1.0.29

libpng libpng 1.0.6

libpng libpng 1.0.7

libpng libpng 1.0.8

libpng libpng 1.0.9

libpng libpng 1.2.0

libpng libpng 1.2.1

libpng libpng 1.2.10

libpng libpng 1.2.11

libpng libpng 1.2.13

libpng libpng 1.2.14

libpng libpng 1.2.15

libpng libpng 1.2.16

libpng libpng 1.2.17

libpng libpng 1.2.19

libpng libpng 1.2.2

libpng libpng 1.2.20

libpng libpng 1.2.22

libpng libpng 1.2.23

libpng libpng 1.2.25

libpng libpng 1.2.26

libpng libpng 1.2.3

libpng libpng 1.2.5

libpng libpng 1.2.6

libpng libpng 1.2.8

libpng libpng 1.2.9

libpng libpng 1.4

libpng libpng 1.0.10

libpng libpng 1.0.11

libpng libpng 1.0.14

libpng libpng 1.0.21

libpng libpng 1.0.22

libpng libpng 1.0.24

libpng libpng 1.0.30

libpng libpng 1.0.31

libpng libpng 1.2.24

libpng libpng 1.0.13

libpng libpng 1.0.17

libpng libpng 1.0.18

libpng libpng 1.2.21

libpng libpng 1.2.4

libpng libpng 1.2.7

libpng libpng 1.0.32

Vendor Advisories

Synopsis Moderate: libpng security update Type/Severity Security Advisory: Moderate Topic Updated libpng and libpng10 packages that fix a couple of security issuesare now available for Red Hat Enterprise Linux 21, 4, and 5This update has been rated as having moderate security impact by the RedHat Security ...
Debian Bug report logs - #476669 libpng: CVE-2008-1382 denial of service and possibly code execution Package: libpng; Maintainer for libpng is Anibal Monsalve Salazar <anibal@debianorg>; Reported by: Nico Golde <nion@debianorg> Date: Fri, 18 Apr 2008 11:06:04 UTC Severity: grave Tags: security Found in versions 1 ...
It was discovered that libpng did not properly perform bounds checking in certain operations An attacker could send a specially crafted PNG image and cause a denial of service in applications linked against libpng This issue only affected Ubuntu 804 LTS (CVE-2007-5268, CVE-2007-5269) ...
Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2445 The png_handle_tRNS function allows attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk C ...

References

CWE-189http://www.ocert.org/advisories/ocert-2008-003.htmlhttp://libpng.sourceforge.net/Advisory-1.2.26.txthttp://secunia.com/advisories/29792http://www.securityfocus.com/bid/28770http://www.securitytracker.com/id?1019840http://security.gentoo.org/glsa/glsa-200804-15.xmlhttp://secunia.com/advisories/29678http://www.osvdb.org/44364http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0151http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.541247http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.htmlhttp://secunia.com/advisories/29992http://secunia.com/advisories/29957http://secunia.com/advisories/30009https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00721.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00960.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-May/msg00951.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00033.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00080.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00111.htmlhttp://secunia.com/advisories/30402http://secunia.com/advisories/30486http://www.mandriva.com/security/advisories?name=MDVSA-2008:156http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.htmlhttp://secunia.com/advisories/31882http://www.us-cert.gov/cas/techalerts/TA08-260A.htmlhttp://security.gentoo.org/glsa/glsa-200805-10.xmlhttp://secunia.com/advisories/30174http://secunia.com/advisories/30157http://secunia.com/advisories/33137http://security.gentoo.org/glsa/glsa-200812-15.xmlhttp://secunia.com/advisories/34388http://www.debian.org/security/2009/dsa-1750http://support.apple.com/kb/HT3549http://secunia.com/advisories/35074http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://www.us-cert.gov/cas/techalerts/TA09-133A.htmlhttp://www.vupen.com/english/advisories/2009/1297http://secunia.com/advisories/35258http://www.vmware.com/security/advisories/VMSA-2009-0007.htmlhttp://www.vupen.com/english/advisories/2009/1451http://www.vupen.com/english/advisories/2009/1462http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1http://secunia.com/advisories/35302http://support.avaya.com/elmodocs2/security/ASA-2009-208.htmhttp://secunia.com/advisories/35386http://www.vupen.com/english/advisories/2009/1560http://secunia.com/advisories/34152http://www.redhat.com/support/errata/RHSA-2009-0333.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1http://www.vupen.com/english/advisories/2008/1225/referenceshttp://www.vupen.com/english/advisories/2008/2584https://exchange.xforce.ibmcloud.com/vulnerabilities/41800https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6275https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10326http://www.securityfocus.com/archive/1/503912/100/0/threadedhttp://www.securityfocus.com/archive/1/491424/100/0/threadedhttp://www.securityfocus.com/archive/1/490823/100/0/threadedhttps://access.redhat.com/errata/RHSA-2009:0333https://usn.ubuntu.com/730-1/https://nvd.nist.gov