Vulnerability Name: CVE-2004-0597 (CCN-16894) Assigned: 2004-08-04 Published: 2004-08-04 Updated: 2018-10-12 Summary: Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: SCO Type: UNKNOWNSCOSA-2005.49 Source: CCN Type: BugTraq Mailing List, Wed Aug 04 2004 - 12:43:23 CDTCESA-2004-001: libpng Source: MITRE Type: CNACVE-2004-0597 Source: CONECTIVA Type: UNKNOWNCLA-2004:856 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:856Several vulnerabilities in libpng Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:877New upstream for mozilla Source: APPLE Type: UNKNOWNAPPLE-SA-2004-09-09 Source: BUGTRAQ Type: UNKNOWN20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png) Source: HP Type: UNKNOWNSSRT4778 Source: SCO Type: UNKNOWNSCOSA-2004.16 Source: FEDORA Type: UNKNOWNFLSA:2089 Source: BUGTRAQ Type: UNKNOWN20050209 MSN Messenger PNG Image Buffer Overflow Download Shellcoded Exploit Source: CCN Type: RHSA-2004-402libpng security update Source: CCN Type: RHSA-2004-421mozilla security update Source: MISC Type: Exploit, Vendor Advisoryhttp://scary.beasts.org/security/CESA-2004-001.txt Source: SECUNIA Type: UNKNOWN22957 Source: SECUNIA Type: UNKNOWN22958 Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 12:54:52 -0700 (PDT) [slackware-security] Slackware 9.0, libpng correction (SSA:2004-222-01b) Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:26:39 -0700 (PDT)[slackware-security] imagemagick (SSA:2004-223-02) Source: CCN Type: Slackware Security Advisories Mon, 9 Aug 2004 20:40:50 -0700[slackware-security] libpng (SSA:2004-222-01) Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:17:12 -0700 (PDT)[slackware-security] Mozilla (SSA:2004-223-01) Source: CCN Type: Sun Alert ID: 57617Multiple Security Vulnerabilities in the Portable Network Graphics (PNG) Library libpng(3) Source: CCN Type: Sun Alert ID: 57683Security Vulnerability in Netscape 7 With PNG Files Source: SUNALERT Type: UNKNOWN200663 Source: CONFIRM Type: UNKNOWNhttp://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1 Source: CONFIRM Type: Patchhttp://www.adobe.com/support/downloads/detail.jsp?ftpID=2679 Source: CCN Type: CIAC Information Bulletin O-192"libpng" Package Vulnerabilities Source: CCN Type: CIAC Information Bulletin O-195Mozilla Updated Security Packages Source: CCN Type: CIAC Information Bulletin O-212Apple Security Update Source: CCN Type: CIAC Information Bulletin P-063Adobe Reader Security Vulnerabilities Source: CCN Type: CIAC Information Bulletin P-136Microsoft PNG Processing Vulnerability Source: MISC Type: UNKNOWNhttp://www.coresecurity.com/common/showdoc.php?idx=421&idxseccion=10 Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-536 Source: DEBIAN Type: DSA-536libpng -- several vulnerabilities Source: CCN Type: GLSA-200408-03libpng: Numerous vulnerabilities Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200408-03 Source: CCN Type: GLSA-200408-22Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200408-22 Source: CCN Type: US-CERT VU#388984libpng fails to properly check length of transparency chunk (tRNS) data Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#388984 Source: CCN Type: US-CERT VU#817368libpng png_handle_sBIT() performs insufficient bounds checking Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#817368 Source: CCN Type: SCO Security Advisory SCOSA-2004.16Multiple Vulnerabilities in libpng Source: MANDRAKE Type: UNKNOWNMDKSA-2004:079 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:212 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:213 Source: CCN Type: Microsoft Security Bulletin MS05-009Vulnerability in PNG Processing Could Allow Remote Code Execution (890261) Source: CONFIRM Type: UNKNOWNhttp://www.mozilla.org/projects/security/known-vulnerabilities.html Source: SUSE Type: Patch, Vendor AdvisorySUSE-SA:2004:023 Source: CCN Type: OpenPKG-SA-2004.035libpng Source: REDHAT Type: UNKNOWNRHSA-2004:402 Source: REDHAT Type: Vendor AdvisoryRHSA-2004:421 Source: REDHAT Type: Vendor AdvisoryRHSA-2004:429 Source: BID Type: Exploit, Patch, Vendor Advisory10857 Source: CCN Type: BID-10857LibPNG Graphics Library Multiple Remote Vulnerabilities Source: CCN Type: BID-12506Microsoft MSN Messenger/Windows Messenger PNG Buffer Overflow Vulnerability Source: BID Type: UNKNOWN15495 Source: CCN Type: BID-15495SCO OpenServer Release 5.0.7 Maintenance Pack 4 Released - Multiple Vulnerabilities Fixed Source: TRUSTIX Type: Patch, Vendor Advisory2004-0040 Source: CCN Type: TLSA-2004-19Multiple vulnerabilities in libpng Source: CERT Type: Third Party Advisory, US Government ResourceTA04-217A Source: CERT Type: Third Party Advisory, US Government ResourceTA05-039A Source: FEDORA Type: UNKNOWNFLSA:1943 Source: MS Type: UNKNOWNMS05-009 Source: XF Type: UNKNOWNlibpng-pnghandle-bo(16894) Source: XF Type: UNKNOWNlibpng-pnghandle-bo(16894) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11284 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:2274 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:2378 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:4492 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:594 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:7709 Source: SUSE Type: SUSE-SA:2004:023libpng: remote system compromise Source: SUSE Type: SUSE-SA:2004:030apache2: remote DoS condition Source: SUSE Type: SUSE-SA:2004:031cups: remote code execution Source: SUSE Type: SUSE-SA:2004:032apache2: remote denial-of-service Source: SUSE Type: SUSE-SA:2004:033gtk2 gdk-pixbuf: remote code execution Source: SUSE Type: SUSE-SA:2004:034XFree86-libs xshared: remote command execution Source: SUSE Type: SUSE-SA:2004:035samba: remote file disclosure Vulnerable Configuration: Configuration 1 :cpe:/a:greg_roelofs:libpng:*:*:*:*:*:*:*:* (Version <= 1.2.5)OR cpe:/a:microsoft:msn_messenger:6.1:*:*:*:*:*:*:* OR cpe:/a:microsoft:msn_messenger:6.2:*:*:*:*:*:*:* OR cpe:/a:microsoft:windows_media_player:9:*:*:*:*:*:*:* OR cpe:/a:microsoft:windows_messenger:5.0:*:*:*:*:*:*:* Configuration 2 :cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_me:*:*:second_edition:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:libpng:libpng:*:*:*:*:*:*:*:* AND cpe:/o:sun:solaris:8:*:sparc:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9:*:sparc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:7.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:5.1b:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/a:gnome:gnome:2.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:7.0:*:sparc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
greg_roelofs libpng *
microsoft msn messenger 6.1
microsoft msn messenger 6.2
microsoft windows media player 9
microsoft windows messenger 5.0
microsoft windows 98se *
microsoft windows me *
libpng libpng *
sun solaris 8
turbolinux turbolinux server 6.5
compaq tru64 5.1a
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
suse suse linux 8.0
conectiva linux 8.0
sun solaris 9
debian debian linux 3.0
slackware slackware linux 8.1
openpkg openpkg current
gentoo linux *
suse suse linux office server *
netscape navigator 7.0
suse suse email server 3.1
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake multi network firewall 8.2
slackware slackware linux current
turbolinux turbolinux server 6.1
turbolinux turbolinux workstation 6.0
mandrakesoft mandrake linux corporate server 2.1
compaq tru64 5.1b
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
slackware slackware linux 9.0
suse suse linux 8.2
gnome gnome 2.0
redhat enterprise linux 2.1
conectiva linux 9.0
trustix secure linux 2.0
slackware slackware linux 9.1
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
sun solaris 7.0
mandrakesoft mandrake linux corporate server 3.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
suse linux enterprise server 9
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1