CVE-2011-2692

CVSS V2 Medium 6.8 CVSS V3 High 8.8
Description
The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
Overview
  • CVE ID
  • CVE-2011-2692
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2011-07-17T20:55:01
  • Last Modified Date
  • 2023-02-13T01:20:03
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.0.0 1.0.55
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.2.0 1.2.45
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.4.0 1.4.8
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* 1 OR 1.5.0 1.5.4
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://www.kb.cert.org/vuls/id/819894 Third Party Advisory US Government Resource
http://www.libpng.org/pub/png/libpng.html Product Vendor Advisory
http://secunia.com/advisories/45046 Broken Link
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339 Broken Link
http://sourceforge.net/mailarchive/forum.php?thread_name=003101cc2790%24fb5d6e80%24f2184b80%24%40acm.org&forum_name=png-mng-implement Exploit Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=720612 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/07/13/2 Mailing List Third Party Advisory
http://secunia.com/advisories/45445 Broken Link
http://secunia.com/advisories/45461 Broken Link
http://www.securityfocus.com/bid/48618 Third Party Advisory VDB Entry
http://www.redhat.com/support/errata/RHSA-2011-1104.html Broken Link
http://www.redhat.com/support/errata/RHSA-2011-1103.html Broken Link
http://secunia.com/advisories/45415 Broken Link
http://secunia.com/advisories/45460 Broken Link
http://www.debian.org/security/2011/dsa-2287 Third Party Advisory
http://secunia.com/advisories/45405 Broken Link
http://www.redhat.com/support/errata/RHSA-2011-1105.html Broken Link
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html Mailing List Third Party Advisory
http://www.ubuntu.com/usn/USN-1175-1 Third Party Advisory
http://secunia.com/advisories/45492 Broken Link
http://support.apple.com/kb/HT5002 Third Party Advisory
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:151 Broken Link
http://support.apple.com/kb/HT5281 Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html Mailing List Third Party Advisory
http://security.gentoo.org/glsa/glsa-201206-15.xml Third Party Advisory
http://secunia.com/advisories/49660 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/68536 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 17:25:38 Added to TrackCVE
2023-02-13 02:03:10 2023-02-13T01:20:03 CVE Modified Date updated
2023-02-13 02:03:10 Analyzed Modified Vulnerability Status updated