CVE-2011-2690
17.07.2011, 20:55
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
| Vendor | Product | Version |
|---|---|---|
| libpng | libpng | 1.0.0 ≤ 𝑥 < 1.0.55 |
| libpng | libpng | 1.2.0 ≤ 𝑥 < 1.2.45 |
| libpng | libpng | 1.4.0 ≤ 𝑥 < 1.4.8 |
| libpng | libpng | 1.5.0 ≤ 𝑥 < 1.5.4 |
| debian | debian_linux | 5.0 |
| debian | debian_linux | 6.0 |
| canonical | ubuntu_linux | 8.04 |
| canonical | ubuntu_linux | 10.04 |
| canonical | ubuntu_linux | 10.10 |
| canonical | ubuntu_linux | 11.04 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Ubuntu Product | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| chromium-browser |
| ||||||||||
| firefox |
| ||||||||||
| libpng |
|
References