4.3

CVE-2010-0205

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

Data is provided by the National Vulnerability Database (NVD)
LibpngLibpng Version >= 1.0.0 < 1.0.53
LibpngLibpng Version >= 1.2.0 < 1.2.43
LibpngLibpng Version >= 1.4.0 < 1.4.1
ApplemacOS X Version < 10.6.5
FedoraprojectFedora Version11
FedoraprojectFedora Version12
FedoraprojectFedora Version13
OpensuseOpensuse Version11.0
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Update-
SuseLinux Enterprise Server Version11 Updatesp1
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 8.13% 0.914
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://ubuntu.com/usn/usn-913-1
Third Party Advisory
http://www.kb.cert.org/vuls/id/576029
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/38478
Patch
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1023674
Third Party Advisory
VDB Entry