Description
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:24:26.488Z
Reserved: 2004-06-23T00:00:00.000Z
Link: CVE-2004-0597
No data.
Status : Modified
Published: 2004-11-23T05:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2004-0597
OpenCVE Enrichment
No data.
Weaknesses