First published: Sun Jan 18 2015(Updated: )
Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris SPARC | =11.2 | |
libpng | <=1.5.20 | |
libpng | =1.6.0 | |
libpng | =1.6.0-beta | |
libpng | =1.6.1 | |
libpng | =1.6.1-beta | |
libpng | =1.6.2 | |
libpng | =1.6.2-beta | |
libpng | =1.6.3 | |
libpng | =1.6.3-beta | |
libpng | =1.6.4 | |
libpng | =1.6.4-beta | |
libpng | =1.6.5 | |
libpng | =1.6.6 | |
libpng | =1.6.7 | |
libpng | =1.6.7-beta | |
libpng | =1.6.8 | |
libpng | =1.6.8-beta | |
libpng | =1.6.9 | |
libpng | =1.6.9-beta | |
libpng | =1.6.10 | |
libpng | =1.6.10-beta | |
libpng | =1.6.11 | |
libpng | =1.6.11-beta | |
libpng | =1.6.12-beta | |
libpng | =1.6.13 | |
libpng | =1.6.13-beta | |
libpng | =1.6.14 | |
libpng | =1.6.14-beta | |
libpng | =1.6.15 | |
libpng | =1.6.15-beta | |
Apple iOS and macOS | <=10.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0973 has a high severity rating due to the potential for arbitrary code execution.
To remediate CVE-2015-0973, update to libpng version 1.5.21 or 1.6.16 or later.
CVE-2015-0973 affects libpng versions prior to 1.5.21 and 1.6.x versions before 1.6.16, along with certain versions of Oracle Solaris and macOS.
Yes, CVE-2015-0973 can be exploited by context-dependent attackers via specially crafted IDAT data.
You can check the version of libpng installed on your system against the vulnerable versions to determine if you are at risk from CVE-2015-0973.