// For flags

CVE-2007-5269

libpng DoS via multiple out-of-bounds reads

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.

Determinados manejadores de fragmentos en libpng anterior a 1.0.29 y 1.2.x anterior a 1.2.21 permiten a atacantes remotos provocar una denegación de servicio (caída) mediante fragmentación manipulada (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), y (5) ztXT (png_handle_ztXt) en imágenes PNG, lo cual dispara operaciones de lectura fuera de límite.

Multiple vulnerabilities have been found in AMD64 x86 emulation base libraries, the worst of which may allow remote execution of arbitrary code. Versions prior to 20140406-r1 are affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-10-08 CVE Reserved
  • 2007-10-08 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-125: Out-of-bounds Read
CAPEC
References (73)
URL Tag Source
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html X_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=195261 X_refsource_confirm
http://docs.info.apple.com/article.html?artnum=307562 X_refsource_confirm
http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html Mailing List
http://lists.vmware.com/pipermail/security-announce/2008/000008.html Mailing List
http://secunia.com/advisories/27284 Third Party Advisory
http://secunia.com/advisories/27369 Third Party Advisory
http://secunia.com/advisories/27391 Third Party Advisory
http://secunia.com/advisories/27405 Third Party Advisory
http://secunia.com/advisories/27492 Third Party Advisory
http://secunia.com/advisories/27529 Third Party Advisory
http://secunia.com/advisories/27629 Third Party Advisory
http://secunia.com/advisories/27662 Third Party Advisory
http://secunia.com/advisories/27746 Third Party Advisory
http://secunia.com/advisories/27965 Third Party Advisory
http://secunia.com/advisories/29420 Third Party Advisory
http://secunia.com/advisories/30161 Third Party Advisory
http://secunia.com/advisories/30430 Third Party Advisory
http://secunia.com/advisories/31712 Third Party Advisory
http://secunia.com/advisories/31713 Third Party Advisory
http://secunia.com/advisories/34388 Third Party Advisory
http://secunia.com/advisories/35302 Third Party Advisory
http://secunia.com/advisories/35386 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-460.htm X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm X_refsource_confirm
http://www.coresecurity.com/?action=item&id=2148 X_refsource_misc
http://www.securityfocus.com/archive/1/483582/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/489135/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/489739/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/495869/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25956 Vdb Entry
http://www.securityfocus.com/bid/28276 Vdb Entry
http://www.securitytracker.com/id?1018849 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2008-0005.html X_refsource_confirm
http://www.vmware.com/security/advisories/VMSA-2008-0014.html X_refsource_confirm
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html X_refsource_confirm
http://www.vmware.com/support/player/doc/releasenotes_player.html X_refsource_confirm
http://www.vmware.com/support/player2/doc/releasenotes_player2.html X_refsource_confirm
http://www.vmware.com/support/server/doc/releasenotes_server.html X_refsource_confirm
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html X_refsource_confirm
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html X_refsource_confirm
http://www.vupen.com/english/advisories/2007/3390 Vdb Entry
http://www.vupen.com/english/advisories/2008/0905/references Vdb Entry
http://www.vupen.com/english/advisories/2008/0924/references Vdb Entry
http://www.vupen.com/english/advisories/2008/1697 Vdb Entry
http://www.vupen.com/english/advisories/2008/2466 Vdb Entry
http://www.vupen.com/english/advisories/2009/1462 Vdb Entry
http://www.vupen.com/english/advisories/2009/1560 Vdb Entry
https://bugzilla.redhat.com/show_bug.cgi?id=327791 X_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=337461 X_refsource_confirm
https://issues.rpath.com/browse/RPL-1814 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10614 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libpng
Search vendor "Libpng"
Libpng
Search vendor "Libpng" for product "Libpng"
<= 1.2.20
Search vendor "Libpng" for product "Libpng" and version " <= 1.2.20"
-
Affected
Libpng
Search vendor "Libpng"
Libpng
Search vendor "Libpng" for product "Libpng"
1.0.28
Search vendor "Libpng" for product "Libpng" and version "1.0.28"
-
Affected