Search for vulnerabilities
Vulnerability details: VCID-51sn-78qt-aaab
Vulnerability ID VCID-51sn-78qt-aaab
Aliases CVE-2011-2692
Summary Improper Restriction of Operations within the Bounds of a Memory Buffer The png_handle_sCAL function in pngrutil.c in libpng does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 7.5 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
generic_textual HIGH http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
rhas Moderate https://access.redhat.com/errata/RHSA-2011:1103
rhas Moderate https://access.redhat.com/errata/RHSA-2011:1104
rhas Moderate https://access.redhat.com/errata/RHSA-2011:1105
epss 0.01079 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.01079 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.01079 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.01079 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.02051 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03205 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.03564 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.06252 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
epss 0.07125 https://api.first.org/data/v1/epss?cve=CVE-2011-2692
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2011-2692
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2011-2692
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2011-2692
generic_textual MODERATE http://support.apple.com/kb/HT5002
Reference id Reference type URL
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2692.json
https://api.first.org/data/v1/epss?cve=CVE-2011-2692
https://bugzilla.redhat.com/show_bug.cgi?id=720612
http://secunia.com/advisories/45046
http://secunia.com/advisories/45405
http://secunia.com/advisories/45415
http://secunia.com/advisories/45445
http://secunia.com/advisories/45460
http://secunia.com/advisories/45461
http://secunia.com/advisories/45492
http://secunia.com/advisories/49660
http://security.gentoo.org/glsa/glsa-201206-15.xml
https://exchange.xforce.ibmcloud.com/vulnerabilities/68536
http://sourceforge.net/mailarchive/forum.php?thread_name=003101cc2790%24fb5d6e80%24f2184b80%24%40acm.org&forum_name=png-mng-implement
http://support.apple.com/kb/HT5002
http://support.apple.com/kb/HT5281
http://www.debian.org/security/2011/dsa-2287
http://www.kb.cert.org/vuls/id/819894
http://www.libpng.org/pub/png/libpng.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:151
http://www.openwall.com/lists/oss-security/2011/07/13/2
http://www.redhat.com/support/errata/RHSA-2011-1103.html
http://www.redhat.com/support/errata/RHSA-2011-1104.html
http://www.redhat.com/support/errata/RHSA-2011-1105.html
http://www.securityfocus.com/bid/48618
http://www.ubuntu.com/usn/USN-1175-1
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
CVE-2011-2692 https://nvd.nist.gov/vuln/detail/CVE-2011-2692
GLSA-201206-15 https://security.gentoo.org/glsa/201206-15
RHSA-2011:1103 https://access.redhat.com/errata/RHSA-2011:1103
RHSA-2011:1104 https://access.redhat.com/errata/RHSA-2011:1104
RHSA-2011:1105 https://access.redhat.com/errata/RHSA-2011:1105
USN-1175-1 https://usn.ubuntu.com/1175-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2011-2692
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2011-2692
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2011-2692
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.84048
EPSS Score 0.01079
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.