4.3

CVE-2010-0205

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LibpngLibpng Version >= 1.0.0 < 1.0.53
LibpngLibpng Version >= 1.2.0 < 1.2.43
LibpngLibpng Version >= 1.4.0 < 1.4.1
ApplemacOS X Version < 10.6.5
FedoraprojectFedora Version11
FedoraprojectFedora Version12
FedoraprojectFedora Version13
OpensuseOpensuse Version11.0
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Update-
SuseLinux Enterprise Server Version11 Updatesp1
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.58% 0.892
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://ubuntu.com/usn/usn-913-1
Third Party Advisory
http://www.kb.cert.org/vuls/id/576029
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/38478
Patch
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023674
Third Party Advisory
VDB Entry