CVE-2014-9495

Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
applemac_os_x
𝑥
≤ 10.11.3
libpnglibpng
𝑥
≤ 1.5.20
libpnglibpng
1.6.0
libpnglibpng
1.6.0:beta
libpnglibpng
1.6.1
libpnglibpng
1.6.1:beta
libpnglibpng
1.6.2
libpnglibpng
1.6.2:beta
libpnglibpng
1.6.3
libpnglibpng
1.6.3:beta
libpnglibpng
1.6.4
libpnglibpng
1.6.4:beta
libpnglibpng
1.6.5
libpnglibpng
1.6.6
libpnglibpng
1.6.7
libpnglibpng
1.6.7:beta
libpnglibpng
1.6.8
libpnglibpng
1.6.8:beta
libpnglibpng
1.6.9
libpnglibpng
1.6.9:beta
libpnglibpng
1.6.10
libpnglibpng
1.6.10:beta
libpnglibpng
1.6.11
libpnglibpng
1.6.11:beta
libpnglibpng
1.6.12:beta
libpnglibpng
1.6.13
libpnglibpng
1.6.13:beta
libpnglibpng
1.6.14
libpnglibpng
1.6.14:beta
libpnglibpng
1.6.15
libpnglibpng
1.6.15:beta
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpng1.6
bullseye
1.6.37-3
fixed
squeeze
not-affected
wheezy
not-affected
bookworm
1.6.39-2
fixed
sid
1.6.44-2
fixed
trixie
1.6.44-2
fixed
texlive-bin
bullseye
2020.20200327.54578-7+deb11u1
fixed
squeeze
not-affected
wheezy
not-affected
bullseye (security)
2020.20200327.54578-7+deb11u2
fixed
bookworm
2022.20220321.62855-5.1+deb12u1
fixed
trixie
2024.20240313.70630+ds-4
fixed
sid
2024.20240313.70630+ds-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpng
utopic
not-affected
trusty
not-affected
precise
not-affected
lucid
not-affected