CVE-2004-0597

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

References

ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000856

http://lists.apple.com/mhonarc/security-announce/msg00056.html

http://marc.info/?l=bugtraq&m=109163866717909&w=2

http://marc.info/?l=bugtraq&m=109181639602978&w=2

http://marc.info/?l=bugtraq&m=109761239318458&w=2

http://marc.info/?l=bugtraq&m=109900315219363&w=2

http://marc.info/?l=bugtraq&m=110796779903455&w=2

http://scary.beasts.org/security/CESA-2004-001.txt

http://secunia.com/advisories/22957

http://secunia.com/advisories/22958

http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1

http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1

http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679

http://www.coresecurity.com/common/showdoc.php?idx=421&idxseccion=10

http://www.debian.org/security/2004/dsa-536

http://www.gentoo.org/security/en/glsa/glsa-200408-03.xml

http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml

http://www.kb.cert.org/vuls/id/388984

http://www.kb.cert.org/vuls/id/817368

http://www.mandriva.com/security/advisories?name=MDKSA-2004:079

http://www.mandriva.com/security/advisories?name=MDKSA-2006:212

http://www.mandriva.com/security/advisories?name=MDKSA-2006:213

http://www.mozilla.org/projects/security/known-vulnerabilities.html

http://www.novell.com/linux/security/advisories/2004_23_libpng.html

http://www.redhat.com/support/errata/RHSA-2004-402.html

http://www.redhat.com/support/errata/RHSA-2004-421.html

http://www.redhat.com/support/errata/RHSA-2004-429.html

http://www.securityfocus.com/bid/10857

http://www.securityfocus.com/bid/15495

http://www.trustix.net/errata/2004/0040/

http://www.us-cert.gov/cas/techalerts/TA04-217A.html

http://www.us-cert.gov/cas/techalerts/TA05-039A.html

https://bugzilla.fedora.us/show_bug.cgi?id=1943

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009

https://exchange.xforce.ibmcloud.com/vulnerabilities/16894

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11284

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2274

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2378

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4492

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A594

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7709

Details

Source: MITRE

Published: 2004-11-23

Updated: 2018-10-12

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (58 total)

IDNameProductFamilySeverity
36897FreeBSD : libpng stack-based buffer overflow and other code concerns (f9e3e60b-e650-11d8-9b0a-000347a4fa7d)NessusFreeBSD Local Security Checks
critical
24598Mandrake Linux Security Advisory : chromium (MDKSA-2006:213)NessusMandriva Local Security Checks
critical
24597Mandrake Linux Security Advisory : doxygen (MDKSA-2006:212)NessusMandriva Local Security Checks
critical
3239Mozilla Firefox < 1.0.7 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
3238Mozilla Firefox < 1.7.12 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
3099Mozilla Firefox < 1.0.6 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
3067Mozilla Firefox < 1.7.10 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
3066Mozilla Firefox < 1.0.5 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
18794Slackware 10.0 / 9.1 / current : Mozilla (SSA:2004-223-01)NessusSlackware Local Security Checks
critical
18781Slackware 10.0 / 8.1 / 9.0 / 9.1 / current : libpng (SSA:2004-222-01)NessusSlackware Local Security Checks
critical
18749Slackware 10.0 / 9.1 / current : imagemagick (SSA:2004-223-02)NessusSlackware Local Security Checks
critical
2902Mozilla Firefox < 1.7.8 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2887Mozilla Firefox < 1.0.4 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2789Mozilla Firefox < 1.7.7 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2788Mozilla Firefox < 1.0.3 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2703Mozilla Thunderbird < 1.0.2 Multiple Vulnerabilities (deprecated)Nessus Network MonitorSMTP Clients
high
2671Mozilla Firefox < 1.7.6 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2652Mozilla Firefox < 1.0.1 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
2603MSN Messenger < 6.2.0205 PNG File Remote Overflow (deprecated)Nessus Network MonitorInternet Messengers
high
2602Microsoft Media Player Version 9 PNG Multiple Vulnerabilities (deprecated)Nessus Network MonitorGeneric
high
16328MS05-009: Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)NessusWindows : Microsoft Bulletins
high
15373Debian DSA-536-1 : libpng - several vulnerabilitiesNessusDebian Local Security Checks
critical
14578GLSA-200408-22 : Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilitiesNessusGentoo Local Security Checks
critical
14559GLSA-200408-03 : libpng: Numerous vulnerabilitiesNessusGentoo Local Security Checks
critical
14331Mandrake Linux Security Advisory : mozilla (MDKSA-2004:082)NessusMandriva Local Security Checks
critical
14328Mandrake Linux Security Advisory : libpng (MDKSA-2004:079)NessusMandriva Local Security Checks
critical
1775Mozilla Firefox XML User Interface Language Browser Interface Spoofing (deprecated)Nessus Network MonitorWeb Clients
high
1773Mozilla Firefox < 1.7.1 / Thunderbird < 0.7.1 POP3 Remote Heap Overflow (deprecated)Nessus Network MonitorWeb Clients
high
1772Mozilla Firefox < 1.7.1 Cross-Domain Frame Loading Vulnerability (deprecated)Nessus Network MonitorWeb Clients
high
1771Mozilla Firefox < 1.7.2 Non-FQDN SSL Certificate SpoofingNessus Network MonitorWeb Clients
high
1770Mozilla Firefox < 1.7.1 SSL Redirect SpoofingNessus Network MonitorWeb Clients
high
2116Mozilla Firefox Input Type HTML Tag Unauthorized Access (deprecated)Nessus Network MonitorWeb Clients
high
14242Mac OS X Multiple Vulnerabilities (Security Update 2004-08-09)NessusMacOS X Local Security Checks
medium
14216FreeBSD : libpng stack-based buffer overflow and other code concerns (94)NessusFreeBSD Local Security Checks
critical
14214RHEL 2.1 / 3 : mozilla (RHSA-2004:421)NessusRed Hat Local Security Checks
critical
14213RHEL 2.1 / 3 : libpng (RHSA-2004:402)NessusRed Hat Local Security Checks
critical
14210Fedora Core 2 : libpng-1.2.5-8 (2004-239)NessusFedora Local Security Checks
critical
14209Fedora Core 2 : libpng10-1.0.15-8 (2004-238)NessusFedora Local Security Checks
critical
14208Fedora Core 1 : libpng-1.2.5-7 (2004-237)NessusFedora Local Security Checks
critical
14207Fedora Core 1 : libpng10-1.0.15-7 (2004-236)NessusFedora Local Security Checks
critical
14206SUSE-SA:2004:023: libpngNessusSuSE Local Security Checks
critical
801373Mozilla XML User Interface Language Browser Interface SpoofingLog Correlation EngineWeb Clients
medium
801318Mozilla Browser < 1.7.8 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801295Mozilla Firefox < 1.0.4 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801294Mozilla Browser < 1.7.12 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801293Mozilla < 1.7.7 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801292Mozilla Browser < 1.7.2 Non-FQDN SSL Certificate SpoofingLog Correlation EngineWeb Clients
medium
801263Mozilla < 1.7.1 SSL Redirect SpoofingLog Correlation EngineWeb Clients
medium
801257Mozilla Browser < 1.7.10 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801229Mozilla Browser Input Type HTML Tag Unauthorized AccessLog Correlation EngineWeb Clients
medium
801228Mozilla < 1.7.1 Cross-Domain Frame Loading VulnerabilityLog Correlation EngineWeb Clients
medium
801221Mozilla Thunderbird < 1.0.2 Multiple VulnerabilitiesLog Correlation EngineSMTP Clients
high
801217Mozilla Firefox < 1.0.5 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801215Mozilla < 1.7.6 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
801211Mozilla Browser <1.7.1 / Thunderbird < 0.7.1 SendUIDL POP3 Message Handling Remote Heap OverflowLog Correlation EngineWeb Clients
medium
800781Firefox < 1.0.7 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
800777Firefox < 1.0.6 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high
800745Firefox < 1.0.3 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high