LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

Subscriptions

Vendors Products

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4396-1 libpng1.6 security update
Debian DSA Debian DSA DSA-6076-1 libpng1.6 security update
Ubuntu USN Ubuntu USN USN-7924-1 libpng vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 03 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 26 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*

Wed, 26 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Libpng
Libpng libpng
Vendors & Products Libpng
Libpng libpng

Tue, 25 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 23:45:00 +0000

Type Values Removed Values Added
Description LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Title LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-25T18:55:50.619Z

Reserved: 2025-11-05T19:12:25.104Z

Link: CVE-2025-64505

cve-icon Vulnrichment

Updated: 2025-11-25T18:55:48.097Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-25T00:15:47.133

Modified: 2025-11-26T18:28:32.220

Link: CVE-2025-64505

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-24T23:38:40Z

Links: CVE-2025-64505 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-11-26T11:11:02Z

Weaknesses