Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
2004-11-23T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | greg_roelofs | libpng | ≤ 1.2.5 | Yes |
Application | microsoft | msn_messenger | 6.1 | Yes |
Application | microsoft | msn_messenger | 6.2 | Yes |
Application | microsoft | windows_media_player | 9 | Yes |
Application | microsoft | windows_messenger | 5.0 | Yes |
Operating System | microsoft | windows_98se | * | Yes |
Operating System | microsoft | windows_me | * | Yes |