Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2011-07-17 20:55
Updated : 2024-02-28 11:41
NVD link : CVE-2011-2690
Mitre link : CVE-2011-2690
CVE.ORG link : CVE-2011-2690
JSON object : View
Products Affected
fedoraproject
- fedora
canonical
- ubuntu_linux
debian
- debian_linux
libpng
- libpng
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')