Vulnerability Name: CVE-2004-0598 (CCN-16895) Assigned: 2004-08-04 Published: 2004-08-04 Updated: 2017-10-11 Summary: The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: CCN Type: BugTraq Mailing List, Wed Aug 04 2004 - 12:43:23 CDTCESA-2004-001: libpng Source: MITRE Type: CNACVE-2004-0598 Source: CONECTIVA Type: UNKNOWNCLA-2004:856 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:856Several vulnerabilities in libpng Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:877New upstream for mozilla Source: APPLE Type: UNKNOWNAPPLE-SA-2004-09-09 Source: BUGTRAQ Type: UNKNOWN20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png) Source: HP Type: UNKNOWNSSRT4778 Source: SCO Type: UNKNOWNSCOSA-2004.16 Source: CCN Type: RHSA-2004-402libpng security update Source: MISC Type: Exploit, Vendor Advisoryhttp://scary.beasts.org/security/CESA-2004-001.txt Source: SECUNIA Type: UNKNOWN22957 Source: SECUNIA Type: UNKNOWN22958 Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 12:54:52 -0700 (PDT) [slackware-security] Slackware 9.0, libpng correction (SSA:2004-222-01b) Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:26:39 -0700 (PDT)[slackware-security] imagemagick (SSA:2004-223-02) Source: CCN Type: Slackware Security Advisories Mon, 9 Aug 2004 20:40:50 -0700[slackware-security] libpng (SSA:2004-222-01) Source: CCN Type: Slackware Security Advisories Tue, 10 Aug 2004 14:17:12 -0700 (PDT)[slackware-security] Mozilla (SSA:2004-223-01) Source: CCN Type: Sun Alert ID: 57683Security Vulnerability in Netscape 7 With PNG Files Source: SUNALERT Type: UNKNOWN200663 Source: CCN Type: CIAC Information Bulletin O-192"libpng" Package Vulnerabilities Source: CCN Type: CIAC Information Bulletin O-212Apple Security Update Source: DEBIAN Type: Patch, Vendor AdvisoryDSA-536 Source: DEBIAN Type: DSA 536-1libpng -- several vulnerabilities Source: DEBIAN Type: DSA-536libpng -- several vulnerabilities Source: CCN Type: GLSA-200408-03libpng: Numerous vulnerabilities Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200408-03 Source: CCN Type: GLSA-200408-22Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities Source: GENTOO Type: Patch, Vendor AdvisoryGLSA-200408-22 Source: CCN Type: US-CERT VU#236656libpng png_handle_iCCP() NULL pointer dereference Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#236656 Source: CCN Type: SCO Security Advisory SCOSA-2004.16Multiple Vulnerabilities in libpng Source: MANDRAKE Type: UNKNOWNMDKSA-2004:079 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:212 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:213 Source: CONFIRM Type: UNKNOWNhttp://www.mozilla.org/projects/security/known-vulnerabilities.html Source: SUSE Type: Patch, Vendor AdvisorySUSE-SA:2004:023 Source: CCN Type: OpenPKG-SA-2004.035libpng Source: REDHAT Type: Vendor AdvisoryRHSA-2004:402 Source: REDHAT Type: Vendor AdvisoryRHSA-2004:429 Source: BID Type: Exploit, Patch, Vendor Advisory10857 Source: CCN Type: BID-10857LibPNG Graphics Library Multiple Remote Vulnerabilities Source: TRUSTIX Type: Vendor Advisory2004-0040 Source: CCN Type: TLSA-2004-19Multiple vulnerabilities in libpng Source: CERT Type: Third Party Advisory, US Government ResourceTA04-217A Source: FEDORA Type: PatchFLSA:1943 Source: XF Type: UNKNOWNlibpng-pnghandleiccp-dos(16895) Source: XF Type: UNKNOWNlibpng-pnghandleiccp-dos(16895) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10203 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:2572 Source: SUSE Type: SUSE-SA:2004:023libpng: remote system compromise Source: SUSE Type: SUSE-SA:2004:035samba: remote file disclosure Vulnerable Configuration: Configuration 1 :cpe:/a:greg_roelofs:libpng:*:*:*:*:*:*:*:* (Version <= 1.2.5)Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:libpng:libpng:0.71:*:*:*:*:*:*:* AND cpe:/o:sun:solaris:8::sparc:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.5:*:*:*:server:*:*:* OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/a:netscape:navigator:7.0:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:3.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:current:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:5.1b:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:7.0::sparc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.1::ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
greg_roelofs libpng *
libpng libpng 0.71
sun solaris 8
turbolinux turbolinux server 6.5
compaq tru64 5.1a
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
suse suse linux 8.0
conectiva linux 8.0
sun solaris 9
debian debian linux 3.0
slackware slackware linux 8.1
openpkg openpkg current
gentoo linux *
suse suse linux office server *
netscape navigator 7.0
suse suse email server 3.1
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake multi network firewall 8.2
slackware slackware linux current
turbolinux turbolinux server 6.1
turbolinux turbolinux workstation 6.0
mandrakesoft mandrake linux corporate server 2.1
compaq tru64 5.1b
mandrakesoft mandrake linux 9.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
slackware slackware linux 9.0
suse suse linux 8.2
redhat enterprise linux 2.1
conectiva linux 9.0
trustix secure linux 2.0
slackware slackware linux 9.1
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
openpkg openpkg 2.0
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
slackware slackware linux 10.0
sun solaris 7.0
mandrakesoft mandrake linux corporate server 3.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
suse linux enterprise server 9
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 9.1
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1