Vulnerability Details : CVE-2006-5793
The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2006-5793
- cpe:2.3:a:greg_roelofs:libpng:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.7rc1:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:greg_roelofs:libpng:1.2.11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5793
4.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5793
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:N/A:P |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2006-5793
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-5793
-
http://bugs.gentoo.org/show_bug.cgi?id=154380
Patch
-
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.036.html
-
https://issues.rpath.com/browse/RPL-790
Patch
-
http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
ASA-2007-254 (RHSA-2007-0356)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30290
-
http://www.novell.com/linux/security/advisories/2006_28_sr.html
404 Page Not Found | SUSE
-
http://www.coresecurity.com/?action=item&id=2148
Core Security | Cyber Threat Prevention & Identity Governance
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:212
Advisories - Mandriva Linux
-
http://www.securityfocus.com/archive/1/451874/100/200/threaded
-
http://security.gentoo.org/glsa/glsa-200611-09.xml
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10324
-
http://bugs.gentoo.org/attachment.cgi?id=101400&action=view
Patch
-
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.465035
-
http://www.ubuntu.com/usn/usn-383-1
Patch
-
http://www.redhat.com/support/errata/RHSA-2007-0356.html
Support
-
http://www.vupen.com/english/advisories/2006/4568
Vendor Advisory
-
http://www.securityfocus.com/archive/1/453484/100/100/threaded
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:211
-
http://sourceforge.net/project/shownotes.php?release_id=464278
Patch
-
http://www.vupen.com/english/advisories/2006/4521
Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:210
-
https://issues.rpath.com/browse/RPL-824
-
http://securitytracker.com/id?1017244
-
http://docs.info.apple.com/article.html?artnum=307562
-
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
Android Developers Blog: Android SDK update: m5-rc15 released
-
http://www.securityfocus.com/bid/21078
-
http://www.securityfocus.com/archive/1/489135/100/0/threaded
-
http://www.trustix.org/errata/2006/0065/
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:209
-
http://www.vupen.com/english/advisories/2008/0924/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
Jump to