Libpng

Libpng

48 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.81%
  • Veröffentlicht 17.07.2011 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers t...

  • EPSS 0.93%
  • Veröffentlicht 17.07.2011 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwr...

Exploit
  • EPSS 1.21%
  • Veröffentlicht 17.07.2011 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers...

  • EPSS 5.9%
  • Veröffentlicht 18.01.2011 18:03:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

pngrtran.c in libpng 1.5.x before 1.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted palette-based PNG image that triggers a buffer overflow, related to the png_do_expand_pa...

Exploit
  • EPSS 16.78%
  • Veröffentlicht 30.06.2010 18:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.

  • EPSS 1.57%
  • Veröffentlicht 30.06.2010 18:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.

  • EPSS 8.13%
  • Veröffentlicht 03.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which...

  • EPSS 1.61%
  • Veröffentlicht 12.06.2009 20:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of s...

  • EPSS 8.28%
  • Veröffentlicht 22.02.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a cr...

  • EPSS 3.19%
  • Veröffentlicht 20.02.2009 17:30:03
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.