CVE-2006-0481

Heap-based buffer overflow in the alpha strip capability in libpng 1.2.7 allows context-dependent attackers to cause a denial of service (crash) when the png_do_strip_filler function is used to strip alpha channels out of the image.
References
Link Resource
ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.8-README.txt
http://secunia.com/advisories/18654 Patch Vendor Advisory
http://secunia.com/advisories/18863 Patch Vendor Advisory
http://secunia.com/advisories/33137 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200812-15.xml
http://securitytracker.com/id?1015615 Patch
http://securitytracker.com/id?1015617 Patch
http://www.redhat.com/support/errata/RHSA-2006-0205.html Patch Vendor Advisory
http://www.securityfocus.com/bid/16626 Patch
http://www.vupen.com/english/advisories/2006/0393 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179455
https://exchange.xforce.ibmcloud.com/vulnerabilities/24396
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10780
ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.8-README.txt
http://secunia.com/advisories/18654 Patch Vendor Advisory
http://secunia.com/advisories/18863 Patch Vendor Advisory
http://secunia.com/advisories/33137 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200812-15.xml
http://securitytracker.com/id?1015615 Patch
http://securitytracker.com/id?1015617 Patch
http://www.redhat.com/support/errata/RHSA-2006-0205.html Patch Vendor Advisory
http://www.securityfocus.com/bid/16626 Patch
http://www.vupen.com/english/advisories/2006/0393 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179455
https://exchange.xforce.ibmcloud.com/vulnerabilities/24396
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10780
Configurations

Configuration 1 (hide)

cpe:2.3:a:greg_roelofs:libpng:1.2.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.8-README.txt - () ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.8-README.txt -
References () http://secunia.com/advisories/18654 - Patch, Vendor Advisory () http://secunia.com/advisories/18654 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18863 - Patch, Vendor Advisory () http://secunia.com/advisories/18863 - Patch, Vendor Advisory
References () http://secunia.com/advisories/33137 - Vendor Advisory () http://secunia.com/advisories/33137 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200812-15.xml - () http://security.gentoo.org/glsa/glsa-200812-15.xml -
References () http://securitytracker.com/id?1015615 - Patch () http://securitytracker.com/id?1015615 - Patch
References () http://securitytracker.com/id?1015617 - Patch () http://securitytracker.com/id?1015617 - Patch
References () http://www.redhat.com/support/errata/RHSA-2006-0205.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0205.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/16626 - Patch () http://www.securityfocus.com/bid/16626 - Patch
References () http://www.vupen.com/english/advisories/2006/0393 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0393 - Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179455 - () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179455 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24396 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24396 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10780 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10780 -

Information

Published : 2006-01-31 18:03

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0481

Mitre link : CVE-2006-0481

CVE.ORG link : CVE-2006-0481


JSON object : View

Products Affected

greg_roelofs

  • libpng
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer