CVE-2006-5793

LOW

Description

The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.

References

http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html

http://bugs.gentoo.org/attachment.cgi?id=101400&action=view

http://bugs.gentoo.org/show_bug.cgi?id=154380

http://docs.info.apple.com/article.html?artnum=307562

http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html

http://secunia.com/advisories/22889

http://secunia.com/advisories/22900

http://secunia.com/advisories/22941

http://secunia.com/advisories/22950

http://secunia.com/advisories/22951

http://secunia.com/advisories/22956

http://secunia.com/advisories/22958

http://secunia.com/advisories/23208

http://secunia.com/advisories/23335

http://secunia.com/advisories/25329

http://secunia.com/advisories/25742

http://secunia.com/advisories/29420

http://security.gentoo.org/glsa/glsa-200611-09.xml

http://securitytracker.com/id?1017244

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.465035

http://sourceforge.net/project/shownotes.php?release_id=464278

http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm

http://www.coresecurity.com/?action=item&id=2148

http://www.mandriva.com/security/advisories?name=MDKSA-2006:209

http://www.mandriva.com/security/advisories?name=MDKSA-2006:210

http://www.mandriva.com/security/advisories?name=MDKSA-2006:211

http://www.mandriva.com/security/advisories?name=MDKSA-2006:212

http://www.novell.com/linux/security/advisories/2006_28_sr.html

http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.036.html

http://www.redhat.com/support/errata/RHSA-2007-0356.html

http://www.securityfocus.com/archive/1/451874/100/200/threaded

http://www.securityfocus.com/archive/1/453484/100/100/threaded

http://www.securityfocus.com/archive/1/489135/100/0/threaded

http://www.securityfocus.com/bid/21078

http://www.trustix.org/errata/2006/0065/

http://www.ubuntu.com/usn/usn-383-1

http://www.vupen.com/english/advisories/2006/4521

http://www.vupen.com/english/advisories/2006/4568

http://www.vupen.com/english/advisories/2008/0924/references

https://exchange.xforce.ibmcloud.com/vulnerabilities/30290

https://issues.rpath.com/browse/RPL-790

https://issues.rpath.com/browse/RPL-824

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10324

Details

Source: MITRE

Published: 2006-11-17

Updated: 2018-10-17

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 2.6

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 4.9

Severity: LOW