Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-3048

Опубликовано: 29 мая 2012
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.0.58:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*

EPSS

Процентиль: 91%
0.06152
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 13 лет назад

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.

redhat
больше 13 лет назад

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.

debian
около 13 лет назад

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, ...

github
больше 3 лет назад

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.

oracle-oval
больше 13 лет назад

ELSA-2012-0523: libpng security update (MODERATE)

EPSS

Процентиль: 91%
0.06152
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-119