First published: Tue May 06 2014(Updated: )
Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng Libpng | <=1.5.13 | |
Libpng Libpng | =1.5.0-beta | |
Libpng Libpng | =1.5.1 | |
Libpng Libpng | =1.5.1-beta | |
Libpng Libpng | =1.5.2 | |
Libpng Libpng | =1.5.2-beta | |
Libpng Libpng | =1.5.3-beta | |
Libpng Libpng | =1.5.4 | |
Libpng Libpng | =1.5.4-beta | |
Libpng Libpng | =1.5.5 | |
Libpng Libpng | =1.5.5-beta | |
Libpng Libpng | =1.5.6 | |
Libpng Libpng | =1.5.6-beta | |
Libpng Libpng | =1.5.7 | |
Libpng Libpng | =1.5.7-beta | |
Libpng Libpng | =1.5.8 | |
Libpng Libpng | =1.5.8-beta | |
Libpng Libpng | =1.5.9 | |
Libpng Libpng | =1.5.9-beta | |
Libpng Libpng | =1.5.10-beta | |
Libpng Libpng | =1.5.11 | |
Libpng Libpng | =1.5.11-beta | |
Libpng Libpng | =1.5.12 | |
Libpng Libpng | =1.5.13-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.