Lucene search

K
nvd[email protected]NVD:CVE-2015-8126
HistoryNov 13, 2015 - 3:59 a.m.

CVE-2015-8126

2015-11-1303:59:05
CWE-120
web.nvd.nist.gov
2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%

Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.

Affected configurations

NVD
Node
libpnglibpngRange<1.0.64
OR
libpnglibpngRange1.1.11.2.54
OR
libpnglibpngRange1.3.01.4.17
OR
libpnglibpngRange1.5.01.5.24
OR
libpnglibpngRange1.6.01.6.19
Node
fedoraprojectfedoraMatch21
OR
fedoraprojectfedoraMatch22
OR
fedoraprojectfedoraMatch23
Node
opensuseleapMatch42.1
OR
opensuseopensuseMatch13.1
OR
opensuseopensuseMatch13.2
OR
suselinux_enterprise_desktopMatch11sp3
OR
suselinux_enterprise_desktopMatch11sp4
OR
suselinux_enterprise_desktopMatch12-
OR
suselinux_enterprise_desktopMatch12sp1
OR
suselinux_enterprise_serverMatch12-
OR
suselinux_enterprise_serverMatch12sp1
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
Node
redhatsatelliteMatch5.7
OR
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch6.7
OR
redhatenterprise_linux_eusMatch7.2
OR
redhatenterprise_linux_eusMatch7.3
OR
redhatenterprise_linux_eusMatch7.4
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_eusMatch7.6
OR
redhatenterprise_linux_eusMatch7.7
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.2
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_ausMatch7.7
OR
redhatenterprise_linux_server_tusMatch7.2
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.7
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
redhatsatelliteMatch5.6
AND
redhatenterprise_linuxMatch5.0
OR
redhatenterprise_linuxMatch6.0
Node
oraclejdkMatch1.6.0update105
OR
oraclejdkMatch1.7.0update91
OR
oraclejdkMatch1.8.0update65
OR
oraclejdkMatch1.8.0update66
OR
oraclejreMatch1.6.0update105
OR
oraclejreMatch1.7.0update91
OR
oraclejreMatch1.8.0update65
OR
oraclejreMatch1.8.0update66
OR
oraclelinuxMatch6-
OR
oraclelinuxMatch7-
OR
oraclesolarisMatch11.3
Node
applemac_os_xRange<10.11.4
Node
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch15.04
OR
canonicalubuntu_linuxMatch15.10

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%