Description
The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2287-1 | libpng security update |
EUVD |
EUVD-2011-2673 | The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory. |
Ubuntu USN |
USN-1175-1 | libpng vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:08:23.757Z
Reserved: 2011-07-11T00:00:00.000Z
Link: CVE-2011-2692
No data.
Status : Deferred
Published: 2011-07-17T20:55:01.623
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2692
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN