Search for vulnerabilities
Vulnerability details: VCID-etf6-ws2b-fkdm
Vulnerability ID VCID-etf6-ws2b-fkdm
Aliases CVE-2015-0973
Summary Improper Restriction of Operations within the Bounds of a Memory Buffer Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 8.8 http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
ssvc Track http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.00796 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
epss 0.02006 https://api.first.org/data/v1/epss?cve=CVE-2015-0973
cvssv3.1 8.8 http://secunia.com/advisories/62725
ssvc Track http://secunia.com/advisories/62725
cvssv3.1 8.8 http://sourceforge.net/p/png-mng/mailman/message/33173461/
ssvc Track http://sourceforge.net/p/png-mng/mailman/message/33173461/
cvssv3.1 8.8 https://security.netapp.com/advisory/ntap-20240719-0005/
ssvc Track https://security.netapp.com/advisory/ntap-20240719-0005/
cvssv3.1 8.8 https://support.apple.com/HT206167
ssvc Track https://support.apple.com/HT206167
cvssv3.1 8.8 http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
ssvc Track http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2015/01/10/1
ssvc Track http://www.openwall.com/lists/oss-security/2015/01/10/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2015/01/10/3
ssvc Track http://www.openwall.com/lists/oss-security/2015/01/10/3
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
ssvc Track http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://secunia.com/advisories/62725
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://secunia.com/advisories/62725
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://sourceforge.net/p/png-mng/mailman/message/33173461/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://sourceforge.net/p/png-mng/mailman/message/33173461/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20240719-0005/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at https://security.netapp.com/advisory/ntap-20240719-0005/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/HT206167
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at https://support.apple.com/HT206167
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2015/01/10/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://www.openwall.com/lists/oss-security/2015/01/10/1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2015/01/10/3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://www.openwall.com/lists/oss-security/2015/01/10/3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/ Found at http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.73035
EPSS Score 0.00796
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:21:14.625502+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libpng/CVE-2015-0973.yml 37.0.0