Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16797

Опубликовано: 12 нояб. 2017
Источник: debian

Описание

In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
swftoolsremovedpackage
swftoolsignoredstretchpackage
swftoolsno-dsajessiepackage
swftoolsno-dsawheezypackage

Примечания

  • https://github.com/matthiaskramm/swftools/issues/51

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file.

CVSS3: 7.8
nvd
около 8 лет назад

In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file.

CVSS3: 7.8
github
больше 3 лет назад

In SWFTools 0.9.2, the png_load function in lib/png.c does not properly validate an alloclen_64 multiplication of width and height values, which allows remote attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and application crash) or possibly have unspecified other impact via a crafted PNG file.