CVE-2007-2445
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/05/2007
Última modificación:
16/10/2018
Descripción
La función png_handle_tRNS en pngrutil.c en libpng anterior a 1.0.25 y 1.2.x anterior a 1.2.17 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de un imagen PNG en escala de grises con un mal valor del CRC de un trozo del tRNS.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:* | 1.0.15 (incluyendo) | |
cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:* | 1.2.16 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
- http://docs.info.apple.com/article.html?artnum=307562
- http://irrlicht.sourceforge.net/changes.txt
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://openpkg.com/go/OpenPKG-SA-2007.013
- http://osvdb.org/36196
- http://secunia.com/advisories/25268
- http://secunia.com/advisories/25273
- http://secunia.com/advisories/25292
- http://secunia.com/advisories/25329
- http://secunia.com/advisories/25353
- http://secunia.com/advisories/25461
- http://secunia.com/advisories/25554
- http://secunia.com/advisories/25571
- http://secunia.com/advisories/25742
- http://secunia.com/advisories/25787
- http://secunia.com/advisories/25867
- http://secunia.com/advisories/27056
- http://secunia.com/advisories/29420
- http://secunia.com/advisories/30161
- http://secunia.com/advisories/31168
- http://secunia.com/advisories/34388
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
- http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624
- http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
- http://www.coresecurity.com/?action=item&id=2148
- http://www.debian.org/security/2008/dsa-1613
- http://www.debian.org/security/2009/dsa-1750
- http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
- http://www.kb.cert.org/vuls/id/684664
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A116
- http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt
- http://www.novell.com/linux/security/advisories/2007_13_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0356.html
- http://www.securityfocus.com/archive/1/468910/100/0/threaded
- http://www.securityfocus.com/archive/1/489135/100/0/threaded
- http://www.securityfocus.com/bid/24000
- http://www.securityfocus.com/bid/24023
- http://www.securitytracker.com/id?1018078=
- http://www.trustix.org/errata/2007/0019/
- http://www.ubuntu.com/usn/usn-472-1
- http://www.vupen.com/english/advisories/2007/1838
- http://www.vupen.com/english/advisories/2007/2385
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
- https://issues.rpath.com/browse/RPL-1381
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094