CVE-2013-6954

The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0075.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
http://marc.info/?l=bugtraq&m=140852886808946&w=2
http://marc.info/?l=bugtraq&m=140852886808946&w=2
http://marc.info/?l=bugtraq&m=140852974709252&w=2
http://marc.info/?l=bugtraq&m=140852974709252&w=2
http://secunia.com/advisories/58974
http://secunia.com/advisories/59058
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c Exploit Patch
http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/ Patch
http://www-01.ibm.com/support/docview.wss?uid=swg21672080
http://www-01.ibm.com/support/docview.wss?uid=swg21676746
http://www.kb.cert.org/vuls/id/650142 US Government Resource
http://www.libpng.org/pub/png/libpng.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.securityfocus.com/bid/64493
https://access.redhat.com/errata/RHSA-2014:0413
https://access.redhat.com/errata/RHSA-2014:0414
https://bugzilla.redhat.com/show_bug.cgi?id=1045561
https://www.ibm.com/support/docview.wss?uid=swg21675973
http://advisories.mageia.org/MGASA-2014-0075.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
http://marc.info/?l=bugtraq&m=140852886808946&w=2
http://marc.info/?l=bugtraq&m=140852886808946&w=2
http://marc.info/?l=bugtraq&m=140852974709252&w=2
http://marc.info/?l=bugtraq&m=140852974709252&w=2
http://secunia.com/advisories/58974
http://secunia.com/advisories/59058
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c Exploit Patch
http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/ Patch
http://www-01.ibm.com/support/docview.wss?uid=swg21672080
http://www-01.ibm.com/support/docview.wss?uid=swg21676746
http://www.kb.cert.org/vuls/id/650142 US Government Resource
http://www.libpng.org/pub/png/libpng.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.securityfocus.com/bid/64493
https://access.redhat.com/errata/RHSA-2014:0413
https://access.redhat.com/errata/RHSA-2014:0414
https://bugzilla.redhat.com/show_bug.cgi?id=1045561
https://www.ibm.com/support/docview.wss?uid=swg21675973
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libpng:libpng:*:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0075.html - () http://advisories.mageia.org/MGASA-2014-0075.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html -
References () http://marc.info/?l=bugtraq&m=140852886808946&w=2 - () http://marc.info/?l=bugtraq&m=140852886808946&w=2 -
References () http://marc.info/?l=bugtraq&m=140852974709252&w=2 - () http://marc.info/?l=bugtraq&m=140852974709252&w=2 -
References () http://secunia.com/advisories/58974 - () http://secunia.com/advisories/58974 -
References () http://secunia.com/advisories/59058 - () http://secunia.com/advisories/59058 -
References () http://security.gentoo.org/glsa/glsa-201406-32.xml - () http://security.gentoo.org/glsa/glsa-201406-32.xml -
References () http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c - Exploit, Patch () http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c - Exploit, Patch
References () http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/ - Patch () http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/ - Patch
References () http://www-01.ibm.com/support/docview.wss?uid=swg21672080 - () http://www-01.ibm.com/support/docview.wss?uid=swg21672080 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676746 - () http://www-01.ibm.com/support/docview.wss?uid=swg21676746 -
References () http://www.kb.cert.org/vuls/id/650142 - US Government Resource () http://www.kb.cert.org/vuls/id/650142 - US Government Resource
References () http://www.libpng.org/pub/png/libpng.html - () http://www.libpng.org/pub/png/libpng.html -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:035 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:035 -
References () http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html - () http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html -
References () http://www.securityfocus.com/bid/64493 - () http://www.securityfocus.com/bid/64493 -
References () https://access.redhat.com/errata/RHSA-2014:0413 - () https://access.redhat.com/errata/RHSA-2014:0413 -
References () https://access.redhat.com/errata/RHSA-2014:0414 - () https://access.redhat.com/errata/RHSA-2014:0414 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1045561 - () https://bugzilla.redhat.com/show_bug.cgi?id=1045561 -
References () https://www.ibm.com/support/docview.wss?uid=swg21675973 - () https://www.ibm.com/support/docview.wss?uid=swg21675973 -

Information

Published : 2014-01-12 18:34

Updated : 2024-11-21 02:00


NVD link : CVE-2013-6954

Mitre link : CVE-2013-6954

CVE.ORG link : CVE-2013-6954


JSON object : View

Products Affected

libpng

  • libpng