CVE-2006-3334
Published Jun 30, 2006
Last updated 6 years ago
Overview
- Description
- Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Vendor comments
- Red HatOn Red Hat Enterprise Linux 2.1, 3, 4, and 5 this is a two-byte overflow into the middle of the stack and is not exploitable.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:greg_roelofs:libpng:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1C8FFA0-6B23-4E79-8929-85C59118B06E", "versionEndIncluding": "1.2.11" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "126C1AF2-E47C-490A-8357-6CD47C533744" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4396A76-DA2C-4CA0-B475-8E897672059D" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E4E6626-F83C-4B63-8F50-24D5979BF833" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598A54FD-EEF8-4CCD-A77A-D13DEE767710" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A243D85-1BF9-4F26-9BFE-54AA2C92C577" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83FBCF73-8C31-454D-9D92-294963B92FFF" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA10289F-0B19-4C96-BE58-C5E14E694AD0" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "804C0EA6-67B9-4FED-B16A-751F7F4DD108" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.7rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E7A0FF4-2818-4C78-A4FE-0C56EED47AF9" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82952F59-063D-46D0-8FAA-952CB67EDFC4" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B78CA19F-A9FA-4E6C-B3DB-5391792D6F1F" }, { "criteria": "cpe:2.3:a:greg_roelofs:libpng:1.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6892D36A-7A49-4D5A-993A-3D8F6B68AF10" } ], "operator": "OR" } ] } ]