2.6
CVE-2006-5793
- EPSS 2.33%
- Published 17.11.2006 23:07:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
Data is provided by the National Vulnerability Database (NVD)
Greg Roelofs ≫ Libpng Version1.0.6
Greg Roelofs ≫ Libpng Version1.0.7
Greg Roelofs ≫ Libpng Version1.0.8
Greg Roelofs ≫ Libpng Version1.0.9
Greg Roelofs ≫ Libpng Version1.2.0
Greg Roelofs ≫ Libpng Version1.2.1
Greg Roelofs ≫ Libpng Version1.2.2
Greg Roelofs ≫ Libpng Version1.2.3
Greg Roelofs ≫ Libpng Version1.2.4
Greg Roelofs ≫ Libpng Version1.2.5
Greg Roelofs ≫ Libpng Version1.2.6
Greg Roelofs ≫ Libpng Version1.2.7
Greg Roelofs ≫ Libpng Version1.2.7rc1
Greg Roelofs ≫ Libpng Version1.2.8
Greg Roelofs ≫ Libpng Version1.2.9
Greg Roelofs ≫ Libpng Version1.2.10
Greg Roelofs ≫ Libpng Version1.2.11
Greg Roelofs ≫ Libpng Version1.2.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.33% | 0.842 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.