![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-5907 – Gentoo Linux Security Advisory 201412-08
https://notcve.org/view.php?id=CVE-2008-5907
15 Jan 2009 — The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability. La funcion png_check_keyword en pngwutil.c en libpng anteriores a v1.0.42, v1.2.x anterior a v1.2.34... • http://libpng.sourceforge.net/index.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-3964
https://notcve.org/view.php?id=CVE-2008-3964
10 Sep 2008 — Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c. Múltiples desbordamientos de entero en libpng versiones anteriores a 1.2.32beta01, y 1.4 versiones anteriores a 1.4.0beta34, permiten a atacantes dependientes de contexto provocar ... • http://secunia.com/advisories/31781 • CWE-193: Off-by-one Error •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1382 – libpng unknown chunk handling flaw
https://notcve.org/view.php?id=CVE-2008-1382
14 Apr 2008 — libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory. libpng versions de la 1.0.6 hasta la 1.0.32, 1.2.0 hasta la 1.2.26 y 1.4.0beta01 hasta la 1.4.0beta19, permiten a atacantes dependientes del contexto provocar una denegación de servicio (caída) y posiblemente ejecutar ... • http://libpng.sourceforge.net/Advisory-1.2.26.txt • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-5267
https://notcve.org/view.php?id=CVE-2007-5267
08 Oct 2007 — Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng before 1.2.22 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image, due to an incorrect fix for CVE-2007-5266. Error de superación de límite (off-by-one) en el manejo de perfiles ICC en la función png_set_iCCP de pngset.c en libpng anterior a 1.2.22 beta1 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen PNG manipulada artesanalment... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-5269 – libpng DoS via multiple out-of-bounds reads
https://notcve.org/view.php?id=CVE-2007-5269
08 Oct 2007 — Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. Determinados manejadores de fragmentos en libpng anterior a 1.0.29 y 1.2.x anterior a 1.2.21 permiten a atacantes remotos provocar una denegación de servi... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html • CWE-20: Improper Input Validation CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-5268 – Gentoo Linux Security Advisory 201412-11
https://notcve.org/view.php?id=CVE-2007-5268
08 Oct 2007 — pngrtran.c in libpng before 1.0.29 and 1.2.x before 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image. pngrtran.c en libpng anterior a 1.0.29 y 1.2.x anterior a 1.2.21 utiliza (1) operaciones lógicas en vez de operación sobre bits y (2) comparaciones incorrectas, lo cual podría permitir a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen PNG manipu... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-5266 – Gentoo Linux Security Advisory 201412-11
https://notcve.org/view.php?id=CVE-2007-5266
08 Oct 2007 — Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng before 1.0.29 beta1 and 1.2.x before 1.2.21 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image that prevents a name field from being NULL terminated. Error de superación de límite (off-by-one) en el manejo de perfiles ICC en la función png_set_iCCP de pngset.c en libpng anterior a 1.0.29 beta1 y 1.2.x anterior a 1.2.21 beta1 permite a atacantes remotos provocar una denega... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-2445 – libpng png_handle_tRNS flaw
https://notcve.org/view.php?id=CVE-2007-2445
16 May 2007 — The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. La función png_handle_tRNS en pngrutil.c en libpng anterior a 1.0.25 y 1.2.x anterior a 1.2.17 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de un imagen PNG en escala de grises con un mal valor del CRC de un trozo del tRNS. Multiple vulnerabil... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-5793 – libpng DoS
https://notcve.org/view.php?id=CVE-2006-5793
17 Nov 2006 — The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. El trozo de sPLT manejador de código (la función png_set_sPLT en pngset.c) en libpng 1.0.6 hasta la 1.2.12 usa un operador de sizeof sobre un tipo de datos erroneo, lo cual permite a un atacante dependiente del contexto provocar ... • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-3334
https://notcve.org/view.php?id=CVE-2006-3334
30 Jun 2006 — Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Desbordamiento de búfer en la función png_decompress_chunk en pngrutil.c en libpng anteriores a v1.2.12 permite a los atacantes dependientes de contexto causar una denegación de servicios y posiblemente ejecutar arbitrariam... • http://docs.info.apple.com/article.html?artnum=307562 •