5
CVSSv2

CVE-2013-6954

Published: 12/01/2014 Updated: 05/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The png_do_expand_palette function in libpng prior to 1.6.8 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.

Vulnerable Product Search on Vulmon Subscribe to Product

libpng libpng 1.6.4

libpng libpng 1.6.3

libpng libpng 1.6.7

libpng libpng 1.6.6

libpng libpng 1.6.5

libpng libpng 1.6.2

libpng libpng 1.6.0

libpng libpng 1.6.1

libpng libpng

Vendor Advisories

The png_do_expand_palette function in libpng before 168 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtranc and pngsetc ...

References

NVD-CWE-Otherhttp://www.libpng.org/pub/png/libpng.htmlhttp://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968chttp://www.kb.cert.org/vuls/id/650142https://bugzilla.redhat.com/show_bug.cgi?id=1045561http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/http://www.mandriva.com/security/advisories?name=MDVSA-2014:035http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.htmlhttp://advisories.mageia.org/MGASA-2014-0075.htmlhttp://www.securityfocus.com/bid/64493http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.htmlhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00071.htmlhttp://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.htmlhttp://www-01.ibm.com/support/docview.wss?uid=swg21672080http://www-01.ibm.com/support/docview.wss?uid=swg21676746http://secunia.com/advisories/58974http://secunia.com/advisories/59058https://www.ibm.com/support/docview.wss?uid=swg21675973http://security.gentoo.org/glsa/glsa-201406-32.xmlhttp://marc.info/?l=bugtraq&m=140852974709252&w=2http://marc.info/?l=bugtraq&m=140852886808946&w=2https://access.redhat.com/errata/RHSA-2014:0414https://access.redhat.com/errata/RHSA-2014:0413https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2013-6954https://www.kb.cert.org/vuls/id/650142