CVE-2008-3964

CVSS V2 Medium 4.3 CVSS V3 None
Description
Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.
Overview
  • CVE ID
  • CVE-2008-3964
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2008-09-11T01:13:47
  • Last Modified Date
  • 2022-01-31T14:18:19
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.2.32
cpe:2.3:a:libpng:libpng:1.4.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta10:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta11:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta12:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta13:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta14:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta15:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta16:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta17:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta18:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta19:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta20:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta21:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta22:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta23:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta24:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta25:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta26:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta27:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta28:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta29:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta30:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta31:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta32:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta33:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:libpng:libpng:1.4.0:beta9:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://www.openwall.com/lists/oss-security/2008/09/09/3 Mailing List Third Party Advisory
http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624 Exploit Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=624518 Broken Link Patch
http://www.openwall.com/lists/oss-security/2008/09/09/8 Mailing List Third Party Advisory
http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517 Product Third Party Advisory
http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implement Third Party Advisory
http://www.securityfocus.com/bid/31049 Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/889484 Third Party Advisory US Government Resource
http://secunia.com/advisories/33137 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-15.xml Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:051 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1 Broken Link
http://www.vupen.com/english/advisories/2009/1462 Permissions Required
http://secunia.com/advisories/35302 Third Party Advisory
http://secunia.com/advisories/35386 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm Third Party Advisory
http://www.vupen.com/english/advisories/2009/1560 Permissions Required
http://secunia.com/advisories/31781 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1 Broken Link
http://www.vupen.com/english/advisories/2008/2512 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/44928 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 06:35:47 Added to TrackCVE