First published: Tue Jan 18 2011(Updated: )
pngrtran.c in libpng 1.5.x before 1.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted palette-based PNG image that triggers a buffer overflow, related to the png_do_expand_palette function, the png_do_rgb_to_gray function, and an integer underflow. NOTE: some of these details are obtained from third party information.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0408 is rated as a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2011-0408, upgrade to libpng version 1.5.1 or later.
CVE-2011-0408 can enable remote attackers to crash applications or execute malicious code through specially crafted PNG images.
CVE-2011-0408 affects libpng version 1.5.0 and earlier versions.
The vulnerability in CVE-2011-0408 is located in the pngrtran.c file, specifically in the png_do_expand_palette and png_do_rgb_to_gray functions.