Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5907

Опубликовано: 15 янв. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.

РелизСтатусПримечание
dapper

released

1.2.8rel-5ubuntu0.4
devel

released

1.2.27-2ubuntu2
gutsy

released

1.2.15~beta5-2ubuntu0.2
hardy

released

1.2.15~beta5-3ubuntu0.1
intrepid

released

1.2.27-1ubuntu0.1
upstream

released

1.2.35-1

Показывать по

EPSS

Процентиль: 68%
0.0058
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.

nvd
больше 16 лет назад

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.

debian
больше 16 лет назад

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, ...

github
около 3 лет назад

The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.

fstec
больше 16 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 68%
0.0058
Низкий

5 Medium

CVSS2