Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-13785

Опубликовано: 09 июл. 2018
Источник: debian
EPSS Низкий

Описание

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpng1.6fixed1.6.34-2package
libpng1.6not-affectedstretchpackage

Примечания

  • https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2

  • https://sourceforge.net/p/libpng/bugs/278/

EPSS

Процентиль: 86%
0.02919
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

CVSS3: 6.5
redhat
почти 8 лет назад

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

CVSS3: 6.5
nvd
больше 7 лет назад

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

CVSS3: 6.5
github
больше 3 лет назад

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

suse-cvrf
больше 6 лет назад

Security update for libpng16

EPSS

Процентиль: 86%
0.02919
Низкий