Executive Summary
Summary | |
---|---|
Title | libpng vulnerability |
Informations | |||
---|---|---|---|
Name | USN-383-1 | First vendor Publication | 2006-11-16 |
Vendor | Ubuntu | Last vendor Modification | 2006-11-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 2.6 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 5.10: Ubuntu 6.06 LTS: Ubuntu 6.10: After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Tavis Ormandy discovered that libpng did not correctly calculate the size of sPLT structures when reading an image. By tricking a user or an automated system into processing a specially crafted PNG file, an attacker could exploit this weakness to crash the application using the library. |
Original Source
Url : http://www.ubuntu.com/usn/USN-383-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10324 | |||
Oval ID: | oval:org.mitre.oval:def:10324 | ||
Title: | The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. | ||
Description: | The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-5793 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5009301.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-528 File : nvt/gb_fedora_2007_528_libpng_fc5.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-529 File : nvt/gb_fedora_2007_529_libpng_fc6.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200611-09 (libpng) File : nvt/glsa_200611_09.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2006-335-03 libpng File : nvt/esoft_slk_ssa_2006_335_03.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
30398 | libpng sPLT Chunk Handling DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20070517_libpng_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2008-03-19 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-002.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-2325.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-383-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-2322.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-528.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-529.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0356.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2006-335-03.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-209.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-210.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-211.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2006-212.nasl - Type : ACT_GATHER_INFO |
2006-11-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200611-09.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:03:57 |
|