CVE-2010-1205

CVSS V2 High 7.5 CVSS V3 Critical 9.8
Description
Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
Overview
  • CVE ID
  • CVE-2010-1205
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2010-06-30T18:30:01
  • Last Modified Date
  • 2020-08-14T15:50:45
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.2.44
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.4.0 1.4.3
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* 1 OR 5.0.375.99
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:* 1 OR 10.2
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* 1 OR 5.0.4
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* 1 OR 2.0 4.1
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.6.0 10.6.4
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* 1 OR 10.6.0 10.6.4
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:* 1 OR 2.5 2.5.5
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:* 1 OR 3.1 3.1.2
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* 1 OR 6.5.0 6.5.5
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* 1 OR 7.1 7.1.2
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 3.5.11
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 3.5.12 3.6.7
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 2.0.6
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 1 OR 3.0.6
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 1 OR 3.0.7 3.1.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18 Broken Link
http://www.vupen.com/english/advisories/2010/1612 Broken Link
http://secunia.com/advisories/40302 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=608238 Issue Tracking Patch Third Party Advisory
http://www.securityfocus.com/bid/41174 Third Party Advisory VDB Entry
http://www.libpng.org/pub/png/libpng.html Product Vendor Advisory
https://bugs.webkit.org/show_bug.cgi?id=40798 Permissions Required Third Party Advisory
http://code.google.com/p/chromium/issues/detail?id=45983 Exploit Issue Tracking Mailing List Third Party Advisory
http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html Release Notes Third Party Advisory
http://trac.webkit.org/changeset/61816 Patch Third Party Advisory
http://secunia.com/advisories/40472 Broken Link
http://www.vupen.com/english/advisories/2010/1755 Broken Link
http://www.ubuntu.com/usn/USN-960-1 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133 Broken Link
http://www.debian.org/security/2010/dsa-2072 Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html Mailing List Third Party Advisory
http://secunia.com/advisories/40547 Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html Mailing List Third Party Advisory
http://www.vupen.com/english/advisories/2010/1846 Broken Link
https://bugzilla.mozilla.org/show_bug.cgi?id=570451 Exploit Issue Tracking Third Party Advisory
http://www.vupen.com/english/advisories/2010/1837 Broken Link
http://www.vupen.com/english/advisories/2010/1877 Broken Link
http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html Mailing List Third Party Advisory
http://support.apple.com/kb/HT4312 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html Mailing List Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0014.html Patch Third Party Advisory
http://secunia.com/advisories/41574 Broken Link
http://lists.vmware.com/pipermail/security-announce/2010/000105.html Mailing List Patch Third Party Advisory
http://www.vupen.com/english/advisories/2010/2491 Broken Link
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List Third Party Advisory
http://support.apple.com/kb/HT4435 Broken Link
http://support.apple.com/kb/HT4456 Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html Mailing List Third Party Advisory
http://www.vupen.com/english/advisories/2010/3045 Broken Link
http://www.vupen.com/english/advisories/2010/3046 Broken Link
http://support.apple.com/kb/HT4457 Third Party Advisory
http://secunia.com/advisories/42314 Broken Link
http://secunia.com/advisories/42317 Broken Link
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html Mailing List Third Party Advisory
http://support.apple.com/kb/HT4554 Third Party Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html Mailing List Third Party Advisory
http://support.apple.com/kb/HT4566 Broken Link
http://blackberry.com/btsc/KB27244 Broken Link
http://secunia.com/advisories/40336 Broken Link
http://www.vupen.com/english/advisories/2010/1637 Broken Link
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061 Mailing List Patch Third Party Advisory
http://www.mozilla.org/security/announce/2010/mfsa2010-41.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59815 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11851 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:21:28 Added to TrackCVE