Search for vulnerabilities
Vulnerability details: VCID-gwcb-88br-aaae
Vulnerability ID VCID-gwcb-88br-aaae
Aliases CVE-2010-2249
Summary Missing Release of Memory after Effective Lifetime Memory leak in pngrutil.c in libpng , allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Low http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
generic_textual Medium http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
rhas Important https://access.redhat.com/errata/RHSA-2010:0534
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01567 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.01955 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.02365 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.02365 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.02365 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.02365 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
epss 0.03441 https://api.first.org/data/v1/epss?cve=CVE-2010-2249
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2010-2249
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2010-2249
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2010-2249
generic_textual Low http://support.apple.com/kb/HT4456
generic_textual Medium http://support.apple.com/kb/HT4554
Reference id Reference type URL
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=90cfcecc09febb8d6c8c1d37ea7bb7cf0f4b00f3#patch20
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=90cfcecc09febb8d6c8c1d37ea7bb7cf0f4b00f3#patch20
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://lists.vmware.com/pipermail/security-announce/2010/000105.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2249.json
https://api.first.org/data/v1/epss?cve=CVE-2010-2249
https://bugzilla.redhat.com/show_bug.cgi?id=608644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249
http://secunia.com/advisories/40302
http://secunia.com/advisories/40336
http://secunia.com/advisories/40472
http://secunia.com/advisories/40547
http://secunia.com/advisories/41574
http://secunia.com/advisories/42314
http://secunia.com/advisories/42317
https://exchange.xforce.ibmcloud.com/vulnerabilities/59816
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061
http://support.apple.com/kb/HT4435
http://support.apple.com/kb/HT4456
http://support.apple.com/kb/HT4457
http://support.apple.com/kb/HT4554
http://support.apple.com/kb/HT4566
http://www.debian.org/security/2010/dsa-2072
http://www.libpng.org/pub/png/libpng.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
http://www.securityfocus.com/bid/41174
http://www.securitytracker.com/id?1024723
http://www.ubuntu.com/usn/USN-960-1
http://www.vmware.com/security/advisories/VMSA-2010-0014.html
http://www.vupen.com/english/advisories/2010/1612
http://www.vupen.com/english/advisories/2010/1637
http://www.vupen.com/english/advisories/2010/1755
http://www.vupen.com/english/advisories/2010/1837
http://www.vupen.com/english/advisories/2010/1846
http://www.vupen.com/english/advisories/2010/1877
http://www.vupen.com/english/advisories/2010/2491
http://www.vupen.com/english/advisories/2010/3045
http://www.vupen.com/english/advisories/2010/3046
587670 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587670
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
CVE-2010-2249 https://nvd.nist.gov/vuln/detail/CVE-2010-2249
GLSA-201010-01 https://security.gentoo.org/glsa/201010-01
RHSA-2010:0534 https://access.redhat.com/errata/RHSA-2010:0534
USN-960-1 https://usn.ubuntu.com/960-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-2249
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2010-2249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2010-2249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.79813
EPSS Score 0.01567
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.