CVE-2011-2690

EUVD-2011-2671
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
libpnglibpng
1.0.0 ≤
𝑥
< 1.0.55
libpnglibpng
1.2.0 ≤
𝑥
< 1.2.45
libpnglibpng
1.4.0 ≤
𝑥
< 1.4.8
libpnglibpng
1.5.0 ≤
𝑥
< 1.5.4
debiandebian_linux
5.0
debiandebian_linux
6.0
canonicalubuntu_linux
8.04
canonicalubuntu_linux
10.04
canonicalubuntu_linux
10.10
canonicalubuntu_linux
11.04
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chromium-browser
hardy
dne
lucid
Fixed 14.0.835.202~r103287-0ubuntu0.10.04.2
released
maverick
Fixed 14.0.835.202~r103287-0ubuntu0.10.10.1
released
natty
Fixed 14.0.835.202~r103287-0ubuntu0.11.04.1
released
oneiric
Fixed 14.0.835.202~r103287-0ubuntu1
released
firefox
hardy
ignored
lucid
not-affected
maverick
not-affected
natty
not-affected
oneiric
not-affected
libpng
hardy
Fixed 1.2.15~beta5-3ubuntu0.4
released
lucid
Fixed 1.2.42-1ubuntu2.2
released
maverick
Fixed 1.2.44-1ubuntu0.1
released
natty
Fixed 1.2.44-1ubuntu3.1
released
oneiric
not-affected
References