First published: Sat Jan 10 2015(Updated: )
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.11.3 | |
Libpng Libpng | <=1.5.20 | |
Libpng Libpng | =1.6.0 | |
Libpng Libpng | =1.6.0-beta | |
Libpng Libpng | =1.6.1 | |
Libpng Libpng | =1.6.1-beta | |
Libpng Libpng | =1.6.2 | |
Libpng Libpng | =1.6.2-beta | |
Libpng Libpng | =1.6.3 | |
Libpng Libpng | =1.6.3-beta | |
Libpng Libpng | =1.6.4 | |
Libpng Libpng | =1.6.4-beta | |
Libpng Libpng | =1.6.5 | |
Libpng Libpng | =1.6.6 | |
Libpng Libpng | =1.6.7 | |
Libpng Libpng | =1.6.7-beta | |
Libpng Libpng | =1.6.8 | |
Libpng Libpng | =1.6.8-beta | |
Libpng Libpng | =1.6.9 | |
Libpng Libpng | =1.6.9-beta | |
Libpng Libpng | =1.6.10 | |
Libpng Libpng | =1.6.10-beta | |
Libpng Libpng | =1.6.11 | |
Libpng Libpng | =1.6.11-beta | |
Libpng Libpng | =1.6.12-beta | |
Libpng Libpng | =1.6.13 | |
Libpng Libpng | =1.6.13-beta | |
Libpng Libpng | =1.6.14 | |
Libpng Libpng | =1.6.14-beta | |
Libpng Libpng | =1.6.15 | |
Libpng Libpng | =1.6.15-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.