First published: Fri Jun 30 2006(Updated: )
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng | <=1.2.11 | |
Libpng | =1.2.0 | |
Libpng | =1.2.1 | |
Libpng | =1.2.2 | |
Libpng | =1.2.3 | |
Libpng | =1.2.4 | |
Libpng | =1.2.5 | |
Libpng | =1.2.6 | |
Libpng | =1.2.7 | |
Libpng | =1.2.7rc1 | |
Libpng | =1.2.8 | |
Libpng | =1.2.9 | |
Libpng | =1.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3334 has been classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2006-3334, upgrade to libpng version 1.2.12 or later.
CVE-2006-3334 affects libpng versions prior to 1.2.12, including versions 1.2.0 to 1.2.11.
Yes, CVE-2006-3334 can potentially be exploited by remote attackers through specially crafted PNG files.
The impacts of CVE-2006-3334 may include service interruptions and the execution of arbitrary code on vulnerable systems.