First published: Tue May 06 2014(Updated: )
Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng Libpng | <=1.5.13 | |
Libpng Libpng | =1.5.0-beta | |
Libpng Libpng | =1.5.1 | |
Libpng Libpng | =1.5.1-beta | |
Libpng Libpng | =1.5.2 | |
Libpng Libpng | =1.5.2-beta | |
Libpng Libpng | =1.5.3-beta | |
Libpng Libpng | =1.5.4 | |
Libpng Libpng | =1.5.4-beta | |
Libpng Libpng | =1.5.5 | |
Libpng Libpng | =1.5.5-beta | |
Libpng Libpng | =1.5.6 | |
Libpng Libpng | =1.5.6-beta | |
Libpng Libpng | =1.5.7 | |
Libpng Libpng | =1.5.7-beta | |
Libpng Libpng | =1.5.8 | |
Libpng Libpng | =1.5.8-beta | |
Libpng Libpng | =1.5.9 | |
Libpng Libpng | =1.5.9-beta | |
Libpng Libpng | =1.5.10-beta | |
Libpng Libpng | =1.5.11 | |
Libpng Libpng | =1.5.11-beta | |
Libpng Libpng | =1.5.12 | |
Libpng Libpng | =1.5.13-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.