Vulnerability Details : CVE-2011-2501
The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
Vulnerability category: Denial of service
Products affected by CVE-2011-2501
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
Threat overview for CVE-2011-2501
Top countries where our scanners detected CVE-2011-2501
Top open port discovered on systems with this issue
8200
IPs affected by CVE-2011-2501 2,320
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-2501!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-2501
0.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2501
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2011-2501
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2501
-
http://sourceforge.net/mailarchive/forum.php?thread_name=BANLkTikrnU6FJNQYFvwmt78hwpgKPVRd1Q%40mail.gmail.com&forum_name=png-mng-implement
PNG and MNG/JNG image formats: home site / Thread: [png-mng-implement] CVE-2004-0421Exploit;Issue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/06/28/16
oss-security - Re: CVE request for libpng regression (CVE-2004-0421)Mailing List;Patch;Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-201206-15.xml
libpng: Multiple vulnerabilities (GLSA 201206-15) — Gentoo securityThird Party Advisory
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.617466
The Slackware Linux Project: Slackware Security AdvisoriesMailing List;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/48474
libpng 'pngerror.c' Off-By-One Error Denial Of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2011/06/27/13
oss-security - CVE request for libpng regression (CVE-2004-0421)Mailing List;Patch;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-1175-1
USN-1175-1: libpng vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html
[SECURITY] Fedora 14 Update: libpng-1.2.46-1.fc14Mailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=717084
717084 – (CVE-2011-2501) CVE-2011-2501 libpng: regression of CVE-2004-0421 in 1.2.23+Issue Tracking;Patch;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68517
libpng pngerror.c denial of service CVE-2011-2501 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062720.html
[SECURITY] Fedora 14 Update: mingw32-libpng-1.4.3-2.fc14Mailing List;Third Party Advisory
-
http://www.debian.org/security/2011/dsa-2287
Debian -- Security Information -- DSA-2287-1 libpngThird Party Advisory
Jump to