6.5

CVE-2011-2501

Exploit
The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LibpngLibpng Version >= 1.0.0 < 1.0.55
LibpngLibpng Version >= 1.2.0 < 1.2.45
LibpngLibpng Version >= 1.4.0 < 1.4.8
LibpngLibpng Version >= 1.5.0 < 1.5.4
FedoraprojectFedora Version14
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version8.04
CanonicalUbuntu Linux Version10.04
CanonicalUbuntu Linux Version10.10
CanonicalUbuntu Linux Version11.04
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.25% 0.842
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-125 Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

http://www.openwall.com/lists/oss-security/2011/06/27/13
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2011/06/28/16
Patch
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/48474
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=717084
Patch
Third Party Advisory
Issue Tracking