CVE-2004-0421

The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

History

09 Feb 2024, 00:27

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-125
CPE cpe:2.3:a:redhat:libpng:10.1.0.13.8:*:i386:*:*:*:*:*
cpe:2.3:a:redhat:libpng:10.1.0.13.11:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-20:*:i386:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-16:*:i386:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:10.1.0.13.11:*:i386_dev:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-20:*:i386_dev:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-16:*:i386_dev:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.13:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng:1.0.14:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:a:greg_roelofs:libpng3:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:10.1.0.13.8:*:i386_dev:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-181.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-181.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-180.html - Patch, Vendor Advisory (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-180.html - Broken Link, Patch, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/16022 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/16022 - Broken Link, VDB Entry
References (APPLE) http://lists.apple.com/mhonarc/security-announce/msg00056.html - (APPLE) http://lists.apple.com/mhonarc/security-announce/msg00056.html - Broken Link
References (DEBIAN) http://www.debian.org/security/2004/dsa-498 - (DEBIAN) http://www.debian.org/security/2004/dsa-498 - Broken Link
References (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:040 - (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:040 - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:213 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:213 - Third Party Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=108334922320309&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=108334922320309&w=2 - Mailing List
References (SECUNIA) http://secunia.com/advisories/22957 - (SECUNIA) http://secunia.com/advisories/22957 - Broken Link
References (TRUSTIX) http://marc.info/?l=bugtraq&m=108335030208523&w=2 - (TRUSTIX) http://marc.info/?l=bugtraq&m=108335030208523&w=2 - Mailing List
References (BID) http://www.securityfocus.com/bid/10244 - Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/10244 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710 - Broken Link
References (FEDORA) http://marc.info/?l=fedora-announce-list&m=108451353608968&w=2 - (FEDORA) http://marc.info/?l=fedora-announce-list&m=108451353608968&w=2 - Mailing List
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:212 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2006:212 - Third Party Advisory
References (FEDORA) http://marc.info/?l=fedora-announce-list&m=108451350029261&w=2 - (FEDORA) http://marc.info/?l=fedora-announce-list&m=108451350029261&w=2 - Mailing List
References (SECUNIA) http://secunia.com/advisories/22958 - (SECUNIA) http://secunia.com/advisories/22958 - Broken Link
First Time Libpng
Libpng libpng

Information

Published : 2004-08-18 04:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0421

Mitre link : CVE-2004-0421

CVE.ORG link : CVE-2004-0421


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_desktop
  • libpng

openpkg

  • openpkg

trustix

  • secure_linux

libpng

  • libpng
CWE
CWE-125

Out-of-bounds Read