Описание
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libpng | not-affected | package | ||
| texlive-bin | fixed | 2014.20140926.35254-4 | package | |
| texlive-bin | not-affected | squeeze | package | |
| texlive-bin | not-affected | wheezy | package | |
| libpng1.6 | fixed | 1.6.16-1 | package | |
| iceweasel | not-affected | package | ||
| icedove | not-affected | package |
Примечания
http://sourceforge.net/p/png-mng/mailman/message/33173461/
EPSS
Связанные уязвимости
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
Уязвимость библиотеки libpng, позволяющая нарушителю выполнить произвольный код
EPSS