Vulnerability Details : CVE-2004-0597
Potential exploit
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
Vulnerability category: Execute code
Products affected by CVE-2004-0597
- cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_me:*:*:second_edition:*:*:*:*:*
- cpe:2.3:a:microsoft:msn_messenger:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:msn_messenger:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:windows_messenger:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-0597
90.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0597
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2004-0597
-
http://www.debian.org/security/2004/dsa-536
Patch;Vendor Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009
-
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679
Patch
-
http://www.redhat.com/support/errata/RHSA-2004-429.html
Vendor Advisory
-
http://scary.beasts.org/security/CESA-2004-001.txt
Exploit;Vendor Advisory
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:212
Advisories - Mandriva Linux
-
https://bugzilla.fedora.us/show_bug.cgi?id=1943
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2378
-
http://marc.info/?l=bugtraq&m=109181639602978&w=2
-
http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1
-
http://marc.info/?l=bugtraq&m=109761239318458&w=2
-
http://www.securityfocus.com/bid/15495
-
http://www.trustix.net/errata/2004/0040/
Patch;Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA04-217A.html
Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7709
-
http://www.mandriva.com/security/advisories?name=MDKSA-2004:079
-
http://www.gentoo.org/security/en/glsa/glsa-200408-22.xml
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2274
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16894
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11284
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:213
Advisories - Mandriva Linux
-
http://marc.info/?l=bugtraq&m=109900315219363&w=2
-
http://www.us-cert.gov/cas/techalerts/TA05-039A.html
Third Party Advisory;US Government Resource
-
http://www.mozilla.org/projects/security/known-vulnerabilities.html
-
http://www.securityfocus.com/bid/10857
Exploit;Patch;Vendor Advisory
-
http://www.novell.com/linux/security/advisories/2004_23_libpng.html
Patch;Vendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200408-03.xml
Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=110796779903455&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A594
-
http://www.redhat.com/support/errata/RHSA-2004-402.html
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000856
-
http://marc.info/?l=bugtraq&m=109163866717909&w=2
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1
-
http://www.kb.cert.org/vuls/id/388984
Third Party Advisory;US Government Resource
-
http://www.redhat.com/support/errata/RHSA-2004-421.html
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/817368
Third Party Advisory;US Government Resource
-
http://www.coresecurity.com/common/showdoc.php?idx=421&idxseccion=10
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4492
Jump to