Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-375-1 | libpng security update |
Debian DSA |
DSA-3443-1 | libpng security update |
Ubuntu USN |
USN-2861-1 | libpng vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:20:42.512Z
Reserved: 2015-12-10T00:00:00
Link: CVE-2015-8540
No data.
Status : Deferred
Published: 2016-04-14T14:59:03.287
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-8540
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN