CVE-2018-13785

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
References
Link Resource
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Vendor Advisory
http://www.securityfocus.com/bid/105599 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041889 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3000 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3002 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3007 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3008 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3533 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3534 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3671 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3672 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3779 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3852 Third Party Advisory
https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 Patch Third Party Advisory
https://security.gentoo.org/glsa/201908-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20181018-0001/ Third Party Advisory
https://sourceforge.net/p/libpng/bugs/278/ Third Party Advisory
https://usn.ubuntu.com/3712-1/ Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Vendor Advisory
http://www.securityfocus.com/bid/105599 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041889 Broken Link Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3000 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3002 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3007 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3008 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3533 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3534 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3671 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3672 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3779 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3852 Third Party Advisory
https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 Patch Third Party Advisory
https://security.gentoo.org/glsa/201908-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20181018-0001/ Third Party Advisory
https://sourceforge.net/p/libpng/bugs/278/ Third Party Advisory
https://usn.ubuntu.com/3712-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libpng:libpng:1.6.34:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:jdk:1.6.0:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:11.0.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:47

Type Values Removed Values Added
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Vendor Advisory () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/105599 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105599 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041889 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041889 - Broken Link, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:3000 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3000 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3001 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3001 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3002 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3002 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3003 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3003 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3007 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3007 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3008 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3008 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3533 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3533 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3534 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3534 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3671 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3671 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3672 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3672 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3779 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3779 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3852 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3852 - Third Party Advisory
References () https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 - Patch, Third Party Advisory () https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2 - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201908-10 - Third Party Advisory () https://security.gentoo.org/glsa/201908-10 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20181018-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20181018-0001/ - Third Party Advisory
References () https://sourceforge.net/p/libpng/bugs/278/ - Third Party Advisory () https://sourceforge.net/p/libpng/bugs/278/ - Third Party Advisory
References () https://usn.ubuntu.com/3712-1/ - Third Party Advisory () https://usn.ubuntu.com/3712-1/ - Third Party Advisory

Information

Published : 2018-07-09 13:29

Updated : 2024-11-21 03:47


NVD link : CVE-2018-13785

Mitre link : CVE-2018-13785

CVE.ORG link : CVE-2018-13785


JSON object : View

Products Affected

libpng

  • libpng

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

oracle

  • jdk
  • jre

canonical

  • ubuntu_linux
CWE
CWE-190

Integer Overflow or Wraparound

CWE-369

Divide By Zero