Vulnerability Details : CVE-2015-8472
Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-8472
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.51:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.52:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.53:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.49:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.50:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.2.54:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.0.64:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.21:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.24:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.19:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.23:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.22:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.20:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libpng:libpng:1.6.16:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8472
11.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8472
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
7.3
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
NIST |
CWE ids for CVE-2015-8472
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8472
-
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Oracle Critical Patch Update - January 2016Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
[security-announce] SUSE-SU-2016:0269-1: critical: Security update for j
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
[security-announce] SUSE-SU-2016:0265-1: critical: Security update for j
-
http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/
LIBPNG: PNG reference library - Browse Files at SourceForge.net
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
[security-announce] SUSE-SU-2016:0256-1: critical: Security update for j
-
http://rhn.redhat.com/errata/RHSA-2016-0056.html
RHSA-2016:0056 - Security Advisory - Red Hat Customer Portal
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html
[SECURITY] Fedora 23 Update: libpng15-1.5.25-1.fc23
-
https://support.apple.com/HT206167
About the security content of OS X El Capitan v10.11.4 and Security Update 2016-002 - Apple SupportVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
[security-announce] openSUSE-SU-2016:0279-1: critical: Security update f
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
http://rhn.redhat.com/errata/RHSA-2016-0057.html
RHSA-2016:0057 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
[security-announce] openSUSE-SU-2016:0268-1: critical: Security update f
-
http://www.securityfocus.com/bid/78624
libpng CVE-2015-8472 Incomplete Fix Heap Based Buffer Overflow Vulnerability
-
http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/
LIBPNG: PNG reference library - Browse Files at SourceForge.net
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
[security-announce] openSUSE-SU-2016:0270-1: critical: Security update f
-
http://www.openwall.com/lists/oss-security/2015/12/03/6
oss-security - Status of CVE-2015-8126: libpng buffer overflow in png_set_PLTE
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html
[SECURITY] Fedora 22 Update: libpng15-1.5.25-1.fc22
-
http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/
LIBPNG: PNG reference library - Browse Files at SourceForge.net
-
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
Apple - Lists.apple.com
-
https://access.redhat.com/errata/RHSA-2016:1430
RHSA-2016:1430 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2015-2596.html
RHSA-2015:2596 - Security Advisory - Red Hat Customer Portal
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html
[SECURITY] Fedora 23 Update: libpng-1.6.17-3.fc23
-
http://www.debian.org/security/2016/dsa-3443
Debian -- Security Information -- DSA-3443-1 libpng
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10148
McAfee Security Bulletin: ePolicy Orchestrator update fixes multiple Oracle Java vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
[security-announce] openSUSE-SU-2016:0272-1: important: Security update
-
http://rhn.redhat.com/errata/RHSA-2015-2594.html
RHSA-2015:2594 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-0055.html
RHSA-2016:0055 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2015-2595.html
RHSA-2015:2595 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
[security-announce] openSUSE-SU-2016:0263-1: critical: Security update f
-
http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/
LIBPNG: PNG reference library - Browse Files at SourceForge.net
-
http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/
LIBPNG: PNG reference library - Browse Files at SourceForge.net
Jump to