Buffer overflow in libpng - CVE-2011-2692

 

Buffer overflow in libpng - CVE-2011-2692

Published: July 17, 2011 / Updated: August 11, 2020


Vulnerability identifier: #VU44884
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2011-2692
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: libpng
Affected software:
libpng

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.


How to mitigate CVE-2011-2692

Install update from vendor's website.

Sources