Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-13785


In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.


Published

2018-07-09T13:29:00.443

Last Modified

2024-11-21T03:47:58.677

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-190
    CWE-369

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application libpng libpng 1.6.34 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 16.04 Yes
Operating System canonical ubuntu_linux 17.10 Yes
Operating System canonical ubuntu_linux 18.04 Yes
Application oracle jdk 1.6.0 Yes
Application oracle jdk 1.7.0 Yes
Application oracle jdk 1.8.0 Yes
Application oracle jdk 11.0.0 Yes
Application oracle jre 1.6.0 Yes
Application oracle jre 1.7.0 Yes
Application oracle jre 1.8.0 Yes
Application oracle jre 11.0.0 Yes
Operating System redhat enterprise_linux_desktop 6.0 Yes
Operating System redhat enterprise_linux_desktop 7.0 Yes
Operating System redhat enterprise_linux_server 6.0 Yes
Operating System redhat enterprise_linux_server 7.0 Yes
Operating System redhat enterprise_linux_workstation 6.0 Yes
Operating System redhat enterprise_linux_workstation 7.0 Yes

References