CVE-2011-2690

Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
VendorProductVersion
libpnglibpng
1.0.0 ≤
𝑥
< 1.0.55
libpnglibpng
1.2.0 ≤
𝑥
< 1.2.45
libpnglibpng
1.4.0 ≤
𝑥
< 1.4.8
libpnglibpng
1.5.0 ≤
𝑥
< 1.5.4
debiandebian_linux
5.0
debiandebian_linux
6.0
canonicalubuntu_linux
8.04
canonicalubuntu_linux
10.04
canonicalubuntu_linux
10.10
canonicalubuntu_linux
11.04
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chromium-browser
oneiric
Fixed 14.0.835.202~r103287-0ubuntu1
released
natty
Fixed 14.0.835.202~r103287-0ubuntu0.11.04.1
released
maverick
Fixed 14.0.835.202~r103287-0ubuntu0.10.10.1
released
lucid
Fixed 14.0.835.202~r103287-0ubuntu0.10.04.2
released
hardy
dne
firefox
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
hardy
ignored
libpng
oneiric
not-affected
natty
Fixed 1.2.44-1ubuntu3.1
released
maverick
Fixed 1.2.44-1ubuntu0.1
released
lucid
Fixed 1.2.42-1ubuntu2.2
released
hardy
Fixed 1.2.15~beta5-3ubuntu0.4
released
References