CVE-2011-3048

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.

References

http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html

http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html

http://rhn.redhat.com/errata/RHSA-2012-0523.html

http://secunia.com/advisories/48587

http://secunia.com/advisories/48644

http://secunia.com/advisories/48665

http://secunia.com/advisories/48721

http://secunia.com/advisories/48983

http://secunia.com/advisories/49660

http://security.gentoo.org/glsa/glsa-201206-15.xml

http://support.apple.com/kb/HT5501

http://support.apple.com/kb/HT5503

http://ubuntu.com/usn/usn-1417-1

http://www.debian.org/security/2012/dsa-2446

http://www.libpng.org/pub/png/libpng.html

http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt

http://www.mandriva.com/security/advisories?name=MDVSA-2012:046

http://www.osvdb.org/80822

http://www.securityfocus.com/bid/52830

http://www.securitytracker.com/id?1026879

https://exchange.xforce.ibmcloud.com/vulnerabilities/74494

Details

Source: MITRE

Published: 2012-05-29

Updated: 2017-12-29

Type: CWE-119

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.0.58:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*

cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*

Tenable Plugins

View all (31 total)

IDNameProductFamilySeverity
124924EulerOS Virtualization 3.0.1.0 : libpng (EulerOS-SA-2019-1421)NessusHuawei Local Security Checks
high
80674Oracle Solaris Third-Party Patch Update : libpng (multiple_vulnerabilities_in_libpng2)NessusSolaris Local Security Checks
high
79604F5 Networks BIG-IP : Libpng vulnerability (SOL15881)NessusF5 Networks Local Security Checks
medium
74594openSUSE Security Update : libpng (openSUSE-SU-2012:0491-1)NessusSuSE Local Security Checks
medium
70888ESXi 5.1 < Build 911593 Multiple Vulnerabilities (remote check)NessusMisc.
high
70885ESXi 5.0 < Build 912577 Multiple Vulnerabilities (remote check)NessusMisc.
high
69675Amazon Linux AMI : libpng (ALAS-2012-68)NessusAmazon Linux Local Security Checks
medium
68520Oracle Linux 5 / 6 : libpng (ELSA-2012-0523)NessusOracle Linux Local Security Checks
medium
64189SuSE 11.1 Security Update : libpng (SAT Patch Number 6077)NessusSuSE Local Security Checks
medium
62357Apple TV < 5.1 Multiple VulnerabilitiesNessusGain a shell remotely
high
6589Apple iOS < 6.0 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high
62242Apple iOS < 6.0 Multiple VulnerabilitiesNessusMobile Devices
critical
6583Mac OS X 10.7 < 10.7.5 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
62214Mac OS X 10.7.x < 10.7.5 Multiple Vulnerabilities (BEAST)NessusMacOS X Local Security Checks
critical
62213Mac OS X Multiple Vulnerabilities (Security Update 2012-004) (BEAST)NessusMacOS X Local Security Checks
critical
61307Scientific Linux Security Update : libpng on SL5.x, SL6.x i386/x86_64 (20120425)NessusScientific Linux Local Security Checks
medium
60112Slackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 8.1 / 9.0 / 9.1 / current : libpng (SSA:2012-206-01)NessusSlackware Local Security Checks
medium
59668GLSA-201206-15 : libpng: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
59494SuSE 10 Security Update : libpng (ZYPP Patch Number 8043)NessusSuSE Local Security Checks
medium
58882RHEL 5 / 6 : libpng (RHSA-2012:0523)NessusRed Hat Local Security Checks
medium
58879CentOS 5 / 6 : libpng (CESA-2012:0523)NessusCentOS Local Security Checks
medium
58858Fedora 16 : libpng-1.2.49-1.fc16 (2012-5518)NessusFedora Local Security Checks
medium
58857Fedora 15 : libpng-1.2.49-1.fc15 (2012-5515)NessusFedora Local Security Checks
medium
58715Fedora 17 : libpng-1.5.10-1.fc17 (2012-5526)NessusFedora Local Security Checks
medium
58705Fedora 17 : libpng10-1.0.59-1.fc17 (2012-4902)NessusFedora Local Security Checks
medium
58640FreeBSD : png -- memory corruption/possible remote code execution (262b92fe-81c8-11e1-8899-001ec9578670)NessusFreeBSD Local Security Checks
medium
58637Fedora 16 : libpng10-1.0.59-1.fc16 (2012-5080)NessusFedora Local Security Checks
medium
58636Fedora 15 : libpng10-1.0.59-1.fc15 (2012-5079)NessusFedora Local Security Checks
medium
58617Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libpng vulnerability (USN-1417-1)NessusUbuntu Local Security Checks
medium
58598Debian DSA-2446-1 : libpng - incorrect memory handlingNessusDebian Local Security Checks
medium
58558Mandriva Linux Security Advisory : libpng (MDVSA-2012:046)NessusMandriva Local Security Checks
medium