The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html - | |
References | () http://bugs.gentoo.org/attachment.cgi?id=101400&action=view - Patch | |
References | () http://bugs.gentoo.org/show_bug.cgi?id=154380 - Patch | |
References | () http://docs.info.apple.com/article.html?artnum=307562 - | |
References | () http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html - | |
References | () http://secunia.com/advisories/22889 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22900 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22941 - Vendor Advisory | |
References | () http://secunia.com/advisories/22950 - Vendor Advisory | |
References | () http://secunia.com/advisories/22951 - Vendor Advisory | |
References | () http://secunia.com/advisories/22956 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22958 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23208 - Vendor Advisory | |
References | () http://secunia.com/advisories/23335 - Vendor Advisory | |
References | () http://secunia.com/advisories/25329 - Vendor Advisory | |
References | () http://secunia.com/advisories/25742 - Vendor Advisory | |
References | () http://secunia.com/advisories/29420 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200611-09.xml - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1017244 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.465035 - | |
References | () http://sourceforge.net/project/shownotes.php?release_id=464278 - Patch | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm - | |
References | () http://www.coresecurity.com/?action=item&id=2148 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:209 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:210 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:211 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:212 - | |
References | () http://www.novell.com/linux/security/advisories/2006_28_sr.html - | |
References | () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.036.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0356.html - | |
References | () http://www.securityfocus.com/archive/1/451874/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/453484/100/100/threaded - | |
References | () http://www.securityfocus.com/archive/1/489135/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21078 - | |
References | () http://www.trustix.org/errata/2006/0065/ - | |
References | () http://www.ubuntu.com/usn/usn-383-1 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/4521 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4568 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2008/0924/references - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30290 - | |
References | () https://issues.rpath.com/browse/RPL-790 - Patch | |
References | () https://issues.rpath.com/browse/RPL-824 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10324 - |
Information
Published : 2006-11-17 23:07
Updated : 2024-11-21 00:20
NVD link : CVE-2006-5793
Mitre link : CVE-2006-5793
CVE.ORG link : CVE-2006-5793
JSON object : View
Products Affected
greg_roelofs
- libpng
CWE
CWE-20
Improper Input Validation