9.8

CVE-2010-1205

Exploit

Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LibpngLibpng Version < 1.2.44
LibpngLibpng Version >= 1.4.0 < 1.4.3
GoogleChrome Version < 5.0.375.99
AppleiTunes Version < 10.2
AppleSafari Version < 5.0.4
AppleiPhone OS Version >= 2.0 <= 4.1
ApplemacOS X Version >= 10.6.0 < 10.6.4
ApplemacOS X Server Version >= 10.6.0 < 10.6.4
FedoraprojectFedora Version12
FedoraprojectFedora Version13
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Update-
SuseLinux Enterprise Server Version11 Updatesp1
VMwarePlayer Version >= 2.5 < 2.5.5
VMwarePlayer Version >= 3.1 < 3.1.2
VMwareWorkstation Version >= 6.5.0 < 6.5.5
VMwareWorkstation Version >= 7.1 < 7.1.2
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEdition-
DebianDebian Linux Version5.0
MozillaFirefox Version < 3.5.11
MozillaFirefox Version >= 3.5.12 < 3.6.7
MozillaSeamonkey Version < 2.0.6
MozillaThunderbird Version < 3.0.6
MozillaThunderbird Version >= 3.0.7 < 3.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 17.03% 0.947
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

http://code.google.com/p/chromium/issues/detail?id=45983
Third Party Advisory
Exploit
Mailing List
Issue Tracking
http://trac.webkit.org/changeset/61816
Patch
Third Party Advisory
http://www.securityfocus.com/bid/41174
Third Party Advisory
VDB Entry
https://bugs.webkit.org/show_bug.cgi?id=40798
Third Party Advisory
Permissions Required
https://bugzilla.mozilla.org/show_bug.cgi?id=570451
Third Party Advisory
Exploit
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=608238
Patch
Third Party Advisory
Issue Tracking