Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-5735

Опубликовано: 23 мая 2017
Источник: debian

Описание

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pngquantfixed2.5.0-2package

Примечания

  • https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

CVSS3: 7.8
nvd
больше 8 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

CVSS3: 7.8
github
больше 3 лет назад

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.