Search for vulnerabilities
Vulnerability details: VCID-731z-2fss-aaaq
Vulnerability ID VCID-731z-2fss-aaaq
Aliases CVE-2013-6954
Summary Uncontrolled Resource Consumption The png_do_expand_palette function in libpng allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3.1 6.5 http://advisories.mageia.org/MGASA-2014-0075.html
ssvc Track http://advisories.mageia.org/MGASA-2014-0075.html
cvssv3.1 6.5 http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
cvssv3.1 6.5 http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
cvssv3.1 6.5 http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
cvssv3.1 6.5 http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
cvssv3.1 6.5 http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
cvssv3.1 6.5 http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
ssvc Track http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
cvssv3.1 6.5 http://marc.info/?l=bugtraq&m=140852886808946&w=2
ssvc Track http://marc.info/?l=bugtraq&m=140852886808946&w=2
cvssv3.1 6.5 http://marc.info/?l=bugtraq&m=140852974709252&w=2
ssvc Track http://marc.info/?l=bugtraq&m=140852974709252&w=2
rhas Critical https://access.redhat.com/errata/RHSA-2014:0412
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2014:0413
ssvc Track https://access.redhat.com/errata/RHSA-2014:0413
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2014:0414
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2014:0414
ssvc Track https://access.redhat.com/errata/RHSA-2014:0414
rhas Critical https://access.redhat.com/errata/RHSA-2014:0486
rhas Critical https://access.redhat.com/errata/RHSA-2014:0508
rhas Critical https://access.redhat.com/errata/RHSA-2014:0705
rhas Low https://access.redhat.com/errata/RHSA-2014:0982
epss 0.03546 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.03546 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.03546 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.03546 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.03546 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.06129 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.0709 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.11187 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.13292 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.14580 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.14580 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.14580 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
epss 0.14580 https://api.first.org/data/v1/epss?cve=CVE-2013-6954
cvssv3.1 6.5 https://bugzilla.redhat.com/show_bug.cgi?id=1045561
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=1045561
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
generic_textual Low https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
cvssv3.1 6.5 http://secunia.com/advisories/58974
ssvc Track http://secunia.com/advisories/58974
cvssv3.1 6.5 http://secunia.com/advisories/59058
ssvc Track http://secunia.com/advisories/59058
cvssv3.1 6.5 http://security.gentoo.org/glsa/glsa-201406-32.xml
generic_textual HIGH http://security.gentoo.org/glsa/glsa-201406-32.xml
ssvc Track http://security.gentoo.org/glsa/glsa-201406-32.xml
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2013-6954
cvssv3.1 6.5 http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
ssvc Track http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
cvssv3.1 6.5 http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
ssvc Track http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
cvssv3.1 6.5 https://www.ibm.com/support/docview.wss?uid=swg21675973
ssvc Track https://www.ibm.com/support/docview.wss?uid=swg21675973
cvssv3.1 6.5 http://www-01.ibm.com/support/docview.wss?uid=swg21672080
ssvc Track http://www-01.ibm.com/support/docview.wss?uid=swg21672080
cvssv3.1 6.5 http://www-01.ibm.com/support/docview.wss?uid=swg21676746
ssvc Track http://www-01.ibm.com/support/docview.wss?uid=swg21676746
cvssv3.1 6.5 http://www.kb.cert.org/vuls/id/650142
ssvc Track http://www.kb.cert.org/vuls/id/650142
cvssv3.1 6.5 http://www.libpng.org/pub/png/libpng.html
ssvc Track http://www.libpng.org/pub/png/libpng.html
cvssv3.1 6.5 http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
ssvc Track http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
cvssv3.1 6.5 http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
generic_textual Low http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
ssvc Track http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
cvssv3.1 6.5 http://www.securityfocus.com/bid/64493
ssvc Track http://www.securityfocus.com/bid/64493
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2014-0075.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
http://marc.info/?l=bugtraq&m=140852886808946&w=2
http://marc.info/?l=bugtraq&m=140852974709252&w=2
https://access.redhat.com/errata/RHSA-2014:0413
https://access.redhat.com/errata/RHSA-2014:0414
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6954.json
https://api.first.org/data/v1/epss?cve=CVE-2013-6954
https://bugzilla.redhat.com/show_bug.cgi?id=1045561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
http://secunia.com/advisories/58974
http://secunia.com/advisories/59058
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
https://www.ibm.com/support/docview.wss?uid=swg21675973
http://www-01.ibm.com/support/docview.wss?uid=swg21672080
http://www-01.ibm.com/support/docview.wss?uid=swg21676746
http://www.kb.cert.org/vuls/id/650142
http://www.libpng.org/pub/png/libpng.html
http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
http://www.securityfocus.com/bid/64493
cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:*:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:beta:*:*:*:*:*:*
CVE-2013-6954 https://nvd.nist.gov/vuln/detail/CVE-2013-6954
GLSA-201406-32 https://security.gentoo.org/glsa/201406-32
RHSA-2014:0412 https://access.redhat.com/errata/RHSA-2014:0412
RHSA-2014:0486 https://access.redhat.com/errata/RHSA-2014:0486
RHSA-2014:0508 https://access.redhat.com/errata/RHSA-2014:0508
RHSA-2014:0705 https://access.redhat.com/errata/RHSA-2014:0705
RHSA-2014:0982 https://access.redhat.com/errata/RHSA-2014:0982
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://advisories.mageia.org/MGASA-2014-0075.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://advisories.mageia.org/MGASA-2014-0075.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://marc.info/?l=bugtraq&m=140852886808946&w=2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://marc.info/?l=bugtraq&m=140852886808946&w=2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://marc.info/?l=bugtraq&m=140852974709252&w=2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://marc.info/?l=bugtraq&m=140852974709252&w=2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2014:0413
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at https://access.redhat.com/errata/RHSA-2014:0413
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2014:0414
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at https://access.redhat.com/errata/RHSA-2014:0414
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=1045561
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=1045561
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://secunia.com/advisories/58974
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://secunia.com/advisories/58974
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://secunia.com/advisories/59058
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://secunia.com/advisories/59058
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://security.gentoo.org/glsa/glsa-201406-32.xml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://security.gentoo.org/glsa/glsa-201406-32.xml
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-6954
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://www.ibm.com/support/docview.wss?uid=swg21675973
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at https://www.ibm.com/support/docview.wss?uid=swg21675973
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www-01.ibm.com/support/docview.wss?uid=swg21672080
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www-01.ibm.com/support/docview.wss?uid=swg21672080
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www-01.ibm.com/support/docview.wss?uid=swg21676746
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www-01.ibm.com/support/docview.wss?uid=swg21676746
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.kb.cert.org/vuls/id/650142
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www.kb.cert.org/vuls/id/650142
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.libpng.org/pub/png/libpng.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www.libpng.org/pub/png/libpng.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/64493
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/ Found at http://www.securityfocus.com/bid/64493
Exploit Prediction Scoring System (EPSS)
Percentile 0.87138
EPSS Score 0.03546
Published At June 14, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.