CVE-2008-5907
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.
La funcion png_check_keyword en pngwutil.c en libpng anteriores a v1.0.42, v1.2.x anterior a v1.2.34, permitiría atacantes dependientes de contexto poner a cero el valor de una localización de memoria de su elección a través de vectores relacionados con la creación de ficheros PNG con palabras clave, relacionado con la asignación del valor '\0' a un puntero NULL. NOTA: Algunas fuentes informan incorrectamente que se trata de una vulnerabilidad de doble liberación.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-01-15 CVE Reserved
- 2009-01-15 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://libpng.sourceforge.net/index.html | Third Party Advisory | |
http://openwall.com/lists/oss-security/2009/01/09/1 | Mailing List | |
http://secunia.com/advisories/34320 | Third Party Advisory | |
http://secunia.com/advisories/34388 | Third Party Advisory | |
http://sourceforge.net/mailarchive/forum.php?thread_name=4B6F0239C13D0245820603C036D180BC79FBAA%40CABOTUKEXCH01.cabot.local&forum_name=png-mng-implement | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48128 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html | 2018-11-08 | |
http://security.gentoo.org/glsa/glsa-200903-28.xml | 2018-11-08 | |
http://www.debian.org/security/2009/dsa-1750 | 2018-11-08 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:051 | 2018-11-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libpng Search vendor "Libpng" | Libpng Search vendor "Libpng" for product "Libpng" | < 1.0.42 Search vendor "Libpng" for product "Libpng" and version " < 1.0.42" | - |
Affected
| ||||||
Libpng Search vendor "Libpng" | Libpng Search vendor "Libpng" for product "Libpng" | >= 1.2.0 < 1.2.34 Search vendor "Libpng" for product "Libpng" and version " >= 1.2.0 < 1.2.34" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|