CVE-2013-6954
Published Jan 12, 2014
Last updated 7 years ago
Overview
- Description
- The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
- Source
- cret@cert.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/476.html "CWE-476: NULL Pointer Dereference"
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:*:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C79F2464-B57E-4A57-9763-6159B24E93D7", "versionEndIncluding": "1.6.8" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7A0D174-F35C-488B-8577-00EFB7741089" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "051989A3-3F72-4223-98DF-54B0488656F9" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EDC5DA5-F2A7-4819-BB9D-258EB9AB7857" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.1:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02FCC235-9564-4B92-B1AB-294EAB110E95" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27B34D78-C0BC-45DC-AD84-F5F13451ED7E" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.2:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40C344C8-812C-4EDE-9AD6-31EF7F0E24C2" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3D3A7EC-774C-423F-BDE1-CDCB9433D87B" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9353E66-56D2-4CD1-BC30-5B2FF0F4E722" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B898B95-CF41-4813-8FE7-776BD59A6A9F" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D9BF9ED-965A-4BF5-A3EC-FAFCE880F14A" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F5E5899-5A3F-49A1-B18C-4C97566B87BA" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7897EEC-DE43-485A-B2CD-E8623A6D2C8A" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACC16FE2-E94E-45B9-94F0-B6434B21DD2F" }, { "criteria": "cpe:2.3:a:libpng:libpng:1.6.7:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "278434CA-DD56-47FC-9C15-4B9D4159786C" } ], "operator": "OR" } ] } ]