CVE-2007-2445

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.

References

http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html

http://docs.info.apple.com/article.html?artnum=307562

http://irrlicht.sourceforge.net/changes.txt

http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html

http://openpkg.com/go/OpenPKG-SA-2007.013

http://osvdb.org/36196

http://secunia.com/advisories/25268

http://secunia.com/advisories/25273

http://secunia.com/advisories/25292

http://secunia.com/advisories/25329

http://secunia.com/advisories/25353

http://secunia.com/advisories/25461

http://secunia.com/advisories/25554

http://secunia.com/advisories/25571

http://secunia.com/advisories/25742

http://secunia.com/advisories/25787

http://secunia.com/advisories/25867

http://secunia.com/advisories/27056

http://secunia.com/advisories/29420

http://secunia.com/advisories/30161

http://secunia.com/advisories/31168

http://secunia.com/advisories/34388

http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650

http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624

http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1

http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1

http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm

http://www.coresecurity.com/?action=item&id=2148

http://www.debian.org/security/2008/dsa-1613

http://www.debian.org/security/2009/dsa-1750

http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml

http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml

http://www.kb.cert.org/vuls/id/684664

http://www.mandriva.com/security/advisories?name=MDKSA-2007:116

http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt

http://www.novell.com/linux/security/advisories/2007_13_sr.html

http://www.redhat.com/support/errata/RHSA-2007-0356.html

http://www.securityfocus.com/archive/1/468910/100/0/threaded

http://www.securityfocus.com/archive/1/489135/100/0/threaded

http://www.securityfocus.com/bid/24000

http://www.securityfocus.com/bid/24023

http://www.securitytracker.com/id?1018078

http://www.trustix.org/errata/2007/0019/

http://www.ubuntu.com/usn/usn-472-1

http://www.vupen.com/english/advisories/2007/1838

http://www.vupen.com/english/advisories/2007/2385

http://www.vupen.com/english/advisories/2008/0924/references

https://exchange.xforce.ibmcloud.com/vulnerabilities/34340

https://issues.rpath.com/browse/RPL-1381

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094

Details

Source: MITRE

Published: 2007-05-16

Updated: 2018-10-16

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
107983Solaris 10 (x86) : 137081-10NessusSolaris Local Security Checks
high
107982Solaris 10 (x86) : 137081-09NessusSolaris Local Security Checks
high
107981Solaris 10 (x86) : 137081-07NessusSolaris Local Security Checks
high
107485Solaris 10 (sparc) : 137080-10NessusSolaris Local Security Checks
high
107484Solaris 10 (sparc) : 137080-09NessusSolaris Local Security Checks
high
107483Solaris 10 (sparc) : 137080-07NessusSolaris Local Security Checks
high
79964GLSA-201412-11 : AMD64 x86 emulation base libraries: Multiple vulnerabilities (Heartbleed)NessusGentoo Local Security Checks
critical
67500Oracle Linux 3 / 4 / 5 : libpng (ELSA-2007-0356)NessusOracle Linux Local Security Checks
medium
62266Fedora 7 : libpng10-1.0.26-1.fc7.1 (2007-0004)NessusFedora Local Security Checks
medium
60184Scientific Linux Security Update : libpng on SL5.x, SL4.x, SL3.x i386/x86_64NessusScientific Linux Local Security Checks
medium
35988Debian DSA-1750-1 : libpng - several vulnerabilitiesNessusDebian Local Security Checks
high
34435Solaris 5.9 (sparc) : 139382-01NessusSolaris Local Security Checks
medium
33552Debian DSA-1613-1 : libgd2 - multiple vulnerabilitiesNessusDebian Local Security Checks
medium
31605Mac OS X Multiple Vulnerabilities (Security Update 2008-002)NessusMacOS X Local Security Checks
critical
31337Solaris 10 (x86) : 137081-11 (deprecated)NessusSolaris Local Security Checks
high
31333Solaris 10 (sparc) : 137080-11 (deprecated)NessusSolaris Local Security Checks
high
29508SuSE 10 Security Update : libpng (ZYPP Patch Number 3740)NessusSuSE Local Security Checks
medium
28073Ubuntu 6.06 LTS / 6.10 / 7.04 : libpng vulnerability (USN-472-1)NessusUbuntu Local Security Checks
medium
27331openSUSE 10 Security Update : libpng (libpng-3739)NessusSuSE Local Security Checks
medium
27330openSUSE 10 Security Update : libpng (libpng-3479)NessusSuSE Local Security Checks
medium
25440Mandrake Linux Security Advisory : libpng (MDKSA-2007:116)NessusMandriva Local Security Checks
medium
25383GLSA-200705-24 : libpng: Denial of ServiceNessusGentoo Local Security Checks
medium
25269RHEL 2.1 / 3 / 4 / 5 : libpng (RHSA-2007:0356)NessusRed Hat Local Security Checks
medium
25261FreeBSD : png -- DoS crash vulnerability (4cb9c513-03ef-11dc-a51d-0019b95d4f14)NessusFreeBSD Local Security Checks
medium
25256CentOS 3 / 4 / 5 : libpng (CESA-2007:0356)NessusCentOS Local Security Checks
medium
25253Slackware 10.0 / 10.1 / 10.2 / 11.0 / 8.1 / 9.0 / 9.1 / current : libpng (SSA:2007-136-01)NessusSlackware Local Security Checks
medium
23455Solaris 8 (x86) : 114817-04NessusSolaris Local Security Checks
medium
23367Solaris 8 (sparc) : 114816-04NessusSolaris Local Security Checks
medium