CVE-2011-2690
17.07.2011, 20:55
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
Vendor | Product | Version |
---|---|---|
libpng | libpng | 1.0.0 ≤ 𝑥 < 1.0.55 |
libpng | libpng | 1.2.0 ≤ 𝑥 < 1.2.45 |
libpng | libpng | 1.4.0 ≤ 𝑥 < 1.4.8 |
libpng | libpng | 1.5.0 ≤ 𝑥 < 1.5.4 |
debian | debian_linux | 5.0 |
debian | debian_linux | 6.0 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 10.10 |
canonical | ubuntu_linux | 11.04 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
chromium-browser |
| ||||||||||
firefox |
| ||||||||||
libpng |
|
References