Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5735

Опубликовано: 23 мая 2017
Источник: debian
EPSS Низкий

Описание

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pngquantfixed2.5.0-2package

Примечания

  • https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285

EPSS

Процентиль: 60%
0.00406
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

CVSS3: 7.8
nvd
около 8 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

CVSS3: 7.8
github
около 3 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

EPSS

Процентиль: 60%
0.00406
Низкий