Vulnerability Name: | CVE-2004-0597 (CCN-16894) |
Assigned: | 2004-08-04 |
Published: | 2004-08-04 |
Updated: | 2018-10-12 |
Summary: | Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking. |
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: SCO Type: UNKNOWN SCOSA-2005.49
Source: CCN Type: BugTraq Mailing List, Wed Aug 04 2004 - 12:43:23 CDT CESA-2004-001: libpng
Source: MITRE Type: CNA CVE-2004-0597
Source: CONECTIVA Type: UNKNOWN CLA-2004:856
Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:856 Several vulnerabilities in libpng
Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:877 New upstream for mozilla
Source: APPLE Type: UNKNOWN APPLE-SA-2004-09-09
Source: BUGTRAQ Type: UNKNOWN 20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png)
Source: HP Type: UNKNOWN SSRT4778
Source: SCO Type: UNKNOWN SCOSA-2004.16
Source: FEDORA Type: UNKNOWN FLSA:2089
Source: BUGTRAQ Type: UNKNOWN 20050209 MSN Messenger PNG Image Buffer Overflow Download Shellcoded Exploit
Source: CCN Type: RHSA-2004-402 libpng security update
Source: CCN Type: RHSA-2004-421 mozilla security update
Source: MISC Type: Exploit, Vendor Advisory http://scary.beasts.org/security/CESA-2004-001.txt
Source: SECUNIA Type: UNKNOWN 22957
Source: SECUNIA Type: UNKNOWN 22958
Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 12:54:52 -0700 (PDT) [slackware-security] Slackware 9.0, libpng correction (SSA:2004-222-01b)
Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:26:39 -0700 (PDT) [slackware-security] imagemagick (SSA:2004-223-02)
Source: CCN Type: Slackware Security Advisories Mon, 9 Aug 2004 20:40:50 -0700 [slackware-security] libpng (SSA:2004-222-01)
Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:17:12 -0700 (PDT) [slackware-security] Mozilla (SSA:2004-223-01)
Source: CCN Type: Sun Alert ID: 57617 Multiple Security Vulnerabilities in the Portable Network Graphics (PNG) Library libpng(3)
Source: CCN Type: Sun Alert ID: 57683 Security Vulnerability in Netscape 7 With PNG Files
Source: SUNALERT Type: UNKNOWN 200663
Source: CONFIRM Type: UNKNOWN http://sunsolve.sun.com/search/document.do?assetkey=urn:cds:docid:1-21-114816-02-1
Source: CONFIRM Type: Patch http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679
Source: CCN Type: CIAC Information Bulletin O-192 "libpng" Package Vulnerabilities
Source: CCN Type: CIAC Information Bulletin O-195 Mozilla Updated Security Packages
Source: CCN Type: CIAC Information Bulletin O-212 Apple Security Update
Source: CCN Type: CIAC Information Bulletin P-063 Adobe Reader Security Vulnerabilities
Source: CCN Type: CIAC Information Bulletin P-136 Microsoft PNG Processing Vulnerability
Source: MISC Type: UNKNOWN http://www.coresecurity.com/common/showdoc.php?idx=421&idxseccion=10
Source: DEBIAN Type: Patch, Vendor Advisory DSA-536
Source: DEBIAN Type: DSA-536 libpng -- several vulnerabilities
Source: CCN Type: GLSA-200408-03 libpng: Numerous vulnerabilities
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200408-03
Source: CCN Type: GLSA-200408-22 Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200408-22
Source: CCN Type: US-CERT VU#388984 libpng fails to properly check length of transparency chunk (tRNS) data
Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#388984
Source: CCN Type: US-CERT VU#817368 libpng png_handle_sBIT() performs insufficient bounds checking
Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#817368
Source: CCN Type: SCO Security Advisory SCOSA-2004.16 Multiple Vulnerabilities in libpng
Source: MANDRAKE Type: UNKNOWN MDKSA-2004:079
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:212
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:213
Source: CCN Type: Microsoft Security Bulletin MS05-009 Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)
Source: CONFIRM Type: UNKNOWN http://www.mozilla.org/projects/security/known-vulnerabilities.html
Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2004:023
Source: CCN Type: OpenPKG-SA-2004.035 libpng
Source: REDHAT Type: UNKNOWN RHSA-2004:402
Source: REDHAT Type: Vendor Advisory RHSA-2004:421
Source: REDHAT Type: Vendor Advisory RHSA-2004:429
Source: BID Type: Exploit, Patch, Vendor Advisory 10857
Source: CCN Type: BID-10857 LibPNG Graphics Library Multiple Remote Vulnerabilities
Source: CCN Type: BID-12506 Microsoft MSN Messenger/Windows Messenger PNG Buffer Overflow Vulnerability
Source: BID Type: UNKNOWN 15495
Source: CCN Type: BID-15495 SCO OpenServer Release 5.0.7 Maintenance Pack 4 Released - Multiple Vulnerabilities Fixed
Source: TRUSTIX Type: Patch, Vendor Advisory 2004-0040
Source: CCN Type: TLSA-2004-19 Multiple vulnerabilities in libpng
Source: CERT Type: Third Party Advisory, US Government Resource TA04-217A
Source: CERT Type: Third Party Advisory, US Government Resource TA05-039A
Source: FEDORA Type: UNKNOWN FLSA:1943
Source: MS Type: UNKNOWN MS05-009
Source: XF Type: UNKNOWN libpng-pnghandle-bo(16894)
Source: XF Type: UNKNOWN libpng-pnghandle-bo(16894)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11284
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:2274
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:2378
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:4492
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:594
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:7709
Source: SUSE Type: SUSE-SA:2004:023 libpng: remote system compromise
Source: SUSE Type: SUSE-SA:2004:030 apache2: remote DoS condition
Source: SUSE Type: SUSE-SA:2004:031 cups: remote code execution
Source: SUSE Type: SUSE-SA:2004:032 apache2: remote denial-of-service
Source: SUSE Type: SUSE-SA:2004:033 gtk2 gdk-pixbuf: remote code execution
Source: SUSE Type: SUSE-SA:2004:034 XFree86-libs xshared: remote command execution
Source: SUSE Type: SUSE-SA:2004:035 samba: remote file disclosure
|
Vulnerable Configuration: | Configuration 1: cpe:/a:greg_roelofs:libpng:*:*:*:*:*:*:*:* (Version <= 1.2.5)OR cpe:/a:microsoft:msn_messenger:6.1:*:*:*:*:*:*:*OR cpe:/a:microsoft:msn_messenger:6.2:*:*:*:*:*:*:*OR cpe:/a:microsoft:windows_media_player:9:*:*:*:*:*:*:*OR cpe:/a:microsoft:windows_messenger:5.0:*:*:*:*:*:*:* Configuration 2: cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_me:*:*:second_edition:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:libpng:libpng:*:*:*:*:*:*:*:*AND cpe:/o:sun:solaris:8:*:sparc:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:*OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:*OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*OR cpe:/o:sun:solaris:9:*:sparc:*:*:*:*:*OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*OR cpe:/a:netscape:navigator:7.0:*:*:*:*:*:*:*OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*OR cpe:/o:compaq:tru64:5.1b:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*OR cpe:/a:gnome:gnome:2.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:*OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:sun:solaris:7.0:*:sparc:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
greg_roelofs libpng *
microsoft msn messenger 6.1
microsoft msn messenger 6.2
microsoft windows media player 9
microsoft windows messenger 5.0
microsoft windows 98se *
microsoft windows me *
libpng libpng *
sun solaris 8
turbolinux turbolinux server 6.5
compaq tru64 5.1a
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
suse suse linux 8.0
conectiva linux 8.0
sun solaris 9
debian debian linux 3.0
slackware slackware linux 8.1
openpkg openpkg current
gentoo linux *
suse suse linux office server *
netscape navigator 7.0
suse suse email server 3.1
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake multi network firewall 8.2
slackware slackware linux current
turbolinux turbolinux server 6.1
turbolinux turbolinux workstation 6.0
mandrakesoft mandrake linux corporate server 2.1
compaq tru64 5.1b
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
slackware slackware linux 9.0
suse suse linux 8.2
gnome gnome 2.0
redhat enterprise linux 2.1
conectiva linux 9.0
trustix secure linux 2.0
slackware slackware linux 9.1
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
sun solaris 7.0
mandrakesoft mandrake linux corporate server 3.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
suse linux enterprise server 9
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1