Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-3713

Опубликовано: 08 мар. 2026
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

A flaw was found in libpng. A local attacker could exploit this vulnerability by manipulating the width/height arguments in the do_pnm2png function of the pnm2png component. This manipulation causes a heap-based buffer overflow, which could lead to information disclosure and denial of service (DoS).

Отчет

This MODERATE impact heap-based buffer overflow in the pnm2png utility of libpng requires local execution to exploit. Red Hat products are affected if they process untrusted image data using the pnm2png utility.

Меры по смягчению последствий

To mitigate this vulnerability, avoid processing untrusted image data with the pnm2png utility. Restrict execution of pnm2png to trusted users and ensure that only trusted image files are processed.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of OpenJDK 11 ELSjava-11-openjdkFix deferred
Red Hat build of OpenJDK 11 ELSjava-11-openjdk-portableFix deferred
Red Hat build of OpenJDK 17java-17-openjdk-portableFix deferred
Red Hat build of OpenJDK 1.8java-1.8.0-openjdk-portableFix deferred
Red Hat build of OpenJDK 21java-21-openjdk-portableFix deferred
Red Hat build of OpenJDK 25java-25-openjdk-portableFix deferred
Red Hat Enterprise Linux 10firefoxUnder investigation
Red Hat Enterprise Linux 10java-21-openjdkUnder investigation
Red Hat Enterprise Linux 10java-25-openjdkUnder investigation
Red Hat Enterprise Linux 10libpngUnder investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-131
https://bugzilla.redhat.com/show_bug.cgi?id=2445566libpng: libpng: Heap-based buffer overflow in pnm2png allows information disclosure and denial of service

EPSS

Процентиль: 3%
0.00015
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
18 дней назад

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

CVSS3: 5.3
nvd
18 дней назад

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

msrc
18 дней назад

pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

CVSS3: 5.3
debian
18 дней назад

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by thi ...

CVSS3: 5.3
github
18 дней назад

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

EPSS

Процентиль: 3%
0.00015
Низкий

5.3 Medium

CVSS3