First published: Wed Apr 13 2016(Updated: )
Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OptiPNG | <=0.7.5 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3981 has a high severity rating due to the risk of denial of service and potential for arbitrary code execution.
To fix CVE-2016-3981, you should upgrade to OptiPNG version 0.7.6 or later.
CVE-2016-3981 affects OptiPNG versions earlier than 0.7.6 and various Ubuntu and Debian Linux distributions.
Being affected by CVE-2016-3981 could lead to application crashes or possible arbitrary code execution.
Yes, CVE-2016-3981 can be exploited remotely through crafted image files.