Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
2011-07-17T20:55:01.530
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | libpng | libpng | < 1.0.55 | Yes |
Application | libpng | libpng | < 1.2.45 | Yes |
Application | libpng | libpng | < 1.4.8 | Yes |
Application | libpng | libpng | < 1.5.4 | Yes |
Operating System | fedoraproject | fedora | 14 | Yes |
Operating System | debian | debian_linux | 5.0 | Yes |
Operating System | debian | debian_linux | 6.0 | Yes |
Operating System | canonical | ubuntu_linux | 8.04 | Yes |
Operating System | canonical | ubuntu_linux | 10.04 | Yes |
Operating System | canonical | ubuntu_linux | 10.10 | Yes |
Operating System | canonical | ubuntu_linux | 11.04 | Yes |