// For flags

CVE-2007-5266

Gentoo Linux Security Advisory 201412-11

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng before 1.0.29 beta1 and 1.2.x before 1.2.21 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image that prevents a name field from being NULL terminated.

Error de superación de límite (off-by-one) en el manejo de perfiles ICC en la función png_set_iCCP de pngset.c en libpng anterior a 1.0.29 beta1 y 1.2.x anterior a 1.2.21 beta1 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una imagen PNG manipulada artesanalmente que provoca que el campo de nombre no termine con NULL.

Multiple vulnerabilities have been found in AMD64 x86 emulation base libraries, the worst of which may allow remote execution of arbitrary code. Versions prior to 20140406-r1 are affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-10-08 CVE Reserved
  • 2007-10-08 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (33)
URL Tag Source
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html Third Party Advisory
http://bugs.gentoo.org/show_bug.cgi?id=195261 Third Party Advisory
http://docs.info.apple.com/article.html?artnum=307562 Third Party Advisory
http://secunia.com/advisories/27284 Third Party Advisory
http://secunia.com/advisories/27529 Third Party Advisory
http://secunia.com/advisories/27629 Third Party Advisory
http://secunia.com/advisories/27746 Third Party Advisory
http://secunia.com/advisories/29420 Third Party Advisory
http://secunia.com/advisories/30161 Third Party Advisory
http://secunia.com/advisories/30430 Third Party Advisory
http://secunia.com/advisories/35302 Third Party Advisory
http://secunia.com/advisories/35386 Third Party Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=5122753600C3E94F87FBDFFCC090D1FF0400EA68%40MERCMBX07.na.sas.com&forum_name=png-mng-implement Mailing List
http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0709140846k24e9a040r81623783b6b1c00f%40mail.gmail.com Mailing List
http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm Third Party Advisory
http://www.coresecurity.com/?action=item&id=2148 Third Party Advisory
http://www.securityfocus.com/archive/1/483582/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/489135/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25957 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/0924/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1697 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1462 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1560 Third Party Advisory
https://issues.rpath.com/browse/RPL-1814 Broken Link
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libpng
Search vendor "Libpng"
Libpng
Search vendor "Libpng" for product "Libpng"
<= 1.0.28
Search vendor "Libpng" for product "Libpng" and version " <= 1.0.28"
-
Affected
Libpng
Search vendor "Libpng"
Libpng
Search vendor "Libpng" for product "Libpng"
>= 1.2.0 <= 1.2.20
Search vendor "Libpng" for product "Libpng" and version " >= 1.2.0 <= 1.2.20"
-
Affected