Search for packages
purl | pkg:deb/ubuntu/libpng@1.2.50-1ubuntu2.14.04.2 |
Next non-vulnerable version | 1.2.50-1ubuntu2.14.04.3 |
Latest non-vulnerable version | 1.2.54-1ubuntu1.1 |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-7ep2-beej-aaaf
Aliases: CVE-2016-10087 |
NULL Pointer Dereference The png_set_text_2 function in libpng allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-52ek-nmkc-aaaf | Out-of-bounds Read Integer underflow in the png_check_keyword function in pngwutil.c in libpng allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read. |
CVE-2015-8540
|
VCID-canc-ytmr-aaae | Improper Restriction of Operations within the Bounds of a Memory Buffer Buffer overflow in the png_set_PLTE function in libpng allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126. |
CVE-2015-8472
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|