First published: Thu Feb 27 2014(Updated: )
The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
libp2p | =1.6.0 | |
libp2p | =1.6.0-beta | |
libp2p | =1.6.1 | |
libp2p | =1.6.1-beta | |
libp2p | =1.6.2 | |
libp2p | =1.6.2-beta | |
libp2p | =1.6.3 | |
libp2p | =1.6.3-beta | |
libp2p | =1.6.4 | |
libp2p | =1.6.4-beta | |
libp2p | =1.6.5 | |
libp2p | =1.6.6 | |
libp2p | =1.6.7 | |
libp2p | =1.6.7-beta | |
libp2p | =1.6.8 | |
libp2p | =1.6.8-beta | |
libp2p | =1.6.9 | |
libp2p | =1.6.9-beta | |
=1.6.0 | ||
=1.6.0-beta | ||
=1.6.1 | ||
=1.6.1-beta | ||
=1.6.2 | ||
=1.6.2-beta | ||
=1.6.3 | ||
=1.6.3-beta | ||
=1.6.4 | ||
=1.6.4-beta | ||
=1.6.5 | ||
=1.6.6 | ||
=1.6.7 | ||
=1.6.7-beta | ||
=1.6.8 | ||
=1.6.8-beta | ||
=1.6.9 | ||
=1.6.9-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0333 has a medium severity rating due to the potential for denial of service through resource exhaustion.
To fix CVE-2014-0333, upgrade libpng to version 1.6.10 or later.
CVE-2014-0333 affects libpng versions from 1.6.0 to 1.6.9 inclusive.
Yes, CVE-2014-0333 can be exploited remotely through crafted PNG files containing an IDAT chunk with a length of zero.
CVE-2014-0333 can cause an infinite loop leading to high CPU consumption and potential denial of service on affected systems.