Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:24:26.488Z
Reserved: 2004-06-23T00:00:00
Link: CVE-2004-0597
No data.
Status : Deferred
Published: 2004-11-23T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0597
OpenCVE Enrichment
No data.
Weaknesses