Description
libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1750-1 | New libpng packages fix several vulnerabilities |
EUVD |
EUVD-2008-1389 | libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory. |
Ubuntu USN |
USN-730-1 | libpng vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:17:34.684Z
Reserved: 2008-03-18T00:00:00.000Z
Link: CVE-2008-1382
No data.
Status : Deferred
Published: 2008-04-14T16:05:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-1382
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN