Page 9 of 51 results (0.012 seconds)

CVSS: 5.0EPSS: 88%CPEs: 3EXPL: 0

The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. La función png_handle_tRNS en pngrutil.c en libpng anterior a 1.0.25 y 1.2.x anterior a 1.2.17 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de un imagen PNG en escala de grises con un mal valor del CRC de un trozo del tRNS. • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html http://docs.info.apple.com/article.html?artnum=307562 http://irrlicht.sourceforge.net/changes.txt http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://openpkg.com/go/OpenPKG-SA-2007.013 http://osvdb.org/36196 http://secunia.com/advisories/25268 http://secunia.com/advisories/25273 http://secunia.com/advisories/25292 http://secunia.com/advisories/25329 http://se •

CVSS: 2.6EPSS: 3%CPEs: 18EXPL: 0

The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. El trozo de sPLT manejador de código (la función png_set_sPLT en pngset.c) en libpng 1.0.6 hasta la 1.2.12 usa un operador de sizeof sobre un tipo de datos erroneo, lo cual permite a un atacante dependiente del contexto provocar denegación de servicio (caida) a través de trozos de sPLT mal formador que disparan una lectura fuera del limite. • http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html http://bugs.gentoo.org/attachment.cgi?id=101400&action=view http://bugs.gentoo.org/show_bug.cgi?id=154380 http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/22889 http://secunia.com/advisories/22900 http://secunia.com/advisories/22941 http://secunia.com/advisories/22950 http://secunia.c • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 2%CPEs: 13EXPL: 0

Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Desbordamiento de búfer en la función png_decompress_chunk en pngrutil.c en libpng anteriores a v1.2.12 permite a los atacantes dependientes de contexto causar una denegación de servicios y posiblemente ejecutar arbitrariamente código a través de vectores no especificado en relación a "error de procesamiento", posiblemente relacionados con "chunk_name" • http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://secunia.com/advisories/20960 http://secunia.com/advisories/22956 http://secunia.com/advisories/22957 http://secunia.com/advisories/22958 http://secunia.com/advisories/23335 http://secunia.com/advisories/29420 http://secunia.com/advisories/33137 http://security.gentoo.org/glsa/glsa-200607-06.xml http://security.gentoo.org/glsa/glsa-200812-15.x •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Heap-based buffer overflow in the alpha strip capability in libpng 1.2.7 allows context-dependent attackers to cause a denial of service (crash) when the png_do_strip_filler function is used to strip alpha channels out of the image. • ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.8-README.txt http://secunia.com/advisories/18654 http://secunia.com/advisories/18863 http://secunia.com/advisories/33137 http://security.gentoo.org/glsa/glsa-200812-15.xml http://securitytracker.com/id?1015615 http://securitytracker.com/id?1015617 http://www.redhat.com/support/errata/RHSA-2006-0205.html http://www.securityfocus.com/bid/16626 http://www.vupen.com/english/advisories/2006/0393 https://bugzilla.r • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 96%CPEs: 7EXPL: 5

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking. • https://www.exploit-db.com/exploits/393 https://www.exploit-db.com/exploits/389 https://www.exploit-db.com/exploits/25094 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000856 http://lists.apple.com/mhonarc/security-announce/msg00056.html http://marc.info/?l=bugtraq&m=109163866717909&w=2 http://marc.info/?l=bugtraq&m=109181639602978&w=2 http://marc.info/?l=bugtraq&m=1097612393 •