Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-7981

Опубликовано: 22 окт. 2015
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4libpngWill not fix
Red Hat Enterprise Linux 4libpng10Will not fix
Red Hat Enterprise Linux 5libpngWill not fix
Red Hat Enterprise Linux 7libpngNot affected
Red Hat Enterprise Linux 5 Supplementaryjava-1.7.0-ibmFixedRHSA-2016:010002.02.2016
Red Hat Enterprise Linux 5 Supplementaryjava-1.6.0-ibmFixedRHSA-2016:010102.02.2016
Red Hat Enterprise Linux 6libpngFixedRHSA-2015:259409.12.2015
Red Hat Enterprise Linux 6 Supplementaryjava-1.7.1-ibmFixedRHSA-2016:009902.02.2016
Red Hat Enterprise Linux 6 Supplementaryjava-1.6.0-ibmFixedRHSA-2016:010102.02.2016
Red Hat Enterprise Linux 7libpng12FixedRHSA-2015:259509.12.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1276416libpng: Out-of-bounds read in png_convert_to_rfc1123

EPSS

Процентиль: 73%
0.00786
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 9 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

nvd
больше 9 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

msrc
2 месяца назад

Описание отсутствует

debian
больше 9 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1. ...

github
около 3 лет назад

The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.

EPSS

Процентиль: 73%
0.00786
Низкий

4 Medium

CVSS2