First published: Tue May 06 2014(Updated: )
Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libp2p | <=1.5.13 | |
libp2p | =1.5.0-beta | |
libp2p | =1.5.1 | |
libp2p | =1.5.1-beta | |
libp2p | =1.5.2 | |
libp2p | =1.5.2-beta | |
libp2p | =1.5.3-beta | |
libp2p | =1.5.4 | |
libp2p | =1.5.4-beta | |
libp2p | =1.5.5 | |
libp2p | =1.5.5-beta | |
libp2p | =1.5.6 | |
libp2p | =1.5.6-beta | |
libp2p | =1.5.7 | |
libp2p | =1.5.7-beta | |
libp2p | =1.5.8 | |
libp2p | =1.5.8-beta | |
libp2p | =1.5.9 | |
libp2p | =1.5.9-beta | |
libp2p | =1.5.10-beta | |
libp2p | =1.5.11 | |
libp2p | =1.5.11-beta | |
libp2p | =1.5.12 | |
libp2p | =1.5.13-beta | |
<=1.5.13 | ||
=1.5.0-beta | ||
=1.5.1 | ||
=1.5.1-beta | ||
=1.5.2 | ||
=1.5.2-beta | ||
=1.5.3-beta | ||
=1.5.4 | ||
=1.5.4-beta | ||
=1.5.5 | ||
=1.5.5-beta | ||
=1.5.6 | ||
=1.5.6-beta | ||
=1.5.7 | ||
=1.5.7-beta | ||
=1.5.8 | ||
=1.5.8-beta | ||
=1.5.9 | ||
=1.5.9-beta | ||
=1.5.10-beta | ||
=1.5.11 | ||
=1.5.11-beta | ||
=1.5.12 | ||
=1.5.13-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7353 has a severity rating that may lead to denial of service attacks due to a segmentation fault and crash.
To fix CVE-2013-7353, upgrade to libpng version 1.5.14beta08 or later.
CVE-2013-7353 is categorized as an integer overflow vulnerability causing a heap-based buffer overflow.
CVE-2013-7353 affects libpng versions up to and including 1.5.13 and certain beta versions.
CVE-2013-7353 can be exploited by attackers to create crafted images that lead to application crashes.