Lucene search

K
cveMitreCVE-2006-3334
HistoryJun 30, 2006 - 11:05 p.m.

CVE-2006-3334

2006-06-3023:05:00
mitre
web.nvd.nist.gov
41
cve-2006-3334
buffer overflow
png_decompress_chunk
libpng
security vulnerability
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.6

Confidence

High

EPSS

0.02

Percentile

89.0%

Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to “chunk error processing,” possibly involving the “chunk_name”.

Affected configurations

Nvd
Node
greg_roelofslibpngRange1.2.11
OR
greg_roelofslibpngMatch1.2.0
OR
greg_roelofslibpngMatch1.2.1
OR
greg_roelofslibpngMatch1.2.2
OR
greg_roelofslibpngMatch1.2.3
OR
greg_roelofslibpngMatch1.2.4
OR
greg_roelofslibpngMatch1.2.5
OR
greg_roelofslibpngMatch1.2.6
OR
greg_roelofslibpngMatch1.2.7
OR
greg_roelofslibpngMatch1.2.7rc1
OR
greg_roelofslibpngMatch1.2.8
OR
greg_roelofslibpngMatch1.2.9
OR
greg_roelofslibpngMatch1.2.10
VendorProductVersionCPE
greg_roelofslibpng*cpe:2.3:a:greg_roelofs:libpng:*:*:*:*:*:*:*:*
greg_roelofslibpng1.2.0cpe:2.3:a:greg_roelofs:libpng:1.2.0:*:*:*:*:*:*:*
greg_roelofslibpng1.2.1cpe:2.3:a:greg_roelofs:libpng:1.2.1:*:*:*:*:*:*:*
greg_roelofslibpng1.2.2cpe:2.3:a:greg_roelofs:libpng:1.2.2:*:*:*:*:*:*:*
greg_roelofslibpng1.2.3cpe:2.3:a:greg_roelofs:libpng:1.2.3:*:*:*:*:*:*:*
greg_roelofslibpng1.2.4cpe:2.3:a:greg_roelofs:libpng:1.2.4:*:*:*:*:*:*:*
greg_roelofslibpng1.2.5cpe:2.3:a:greg_roelofs:libpng:1.2.5:*:*:*:*:*:*:*
greg_roelofslibpng1.2.6cpe:2.3:a:greg_roelofs:libpng:1.2.6:*:*:*:*:*:*:*
greg_roelofslibpng1.2.7cpe:2.3:a:greg_roelofs:libpng:1.2.7:*:*:*:*:*:*:*
greg_roelofslibpng1.2.7rc1cpe:2.3:a:greg_roelofs:libpng:1.2.7rc1:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.6

Confidence

High

EPSS

0.02

Percentile

89.0%