| Vulnerability Name: | CVE-2020-27818 (CCN-193591) | ||||||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2020-12-02 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2020-12-02 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2022-06-15 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Summary: | A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability. | ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 3.3 Low (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) 2.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-125 CWE-125 CWE-120 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2020-27818 Source: CCN Type: pngcheck Web site pngcheck Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-2020-04d5e1ce26 Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-2020-23432b7b72 Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-2020-27b168926a Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-2020-4349e95c4f Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-339db397ad Source: MISC Type: Third Party Advisory https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2020-6c93c61069 Source: CCN Type: Red Hat Bugzilla Bug 1902011 (CVE-2020-27818) - CVE-2020-27818 pngcheck: global buffer overflow was discovered in check_chunk_name function via crafted pngfile Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1902011 Source: XF Type: UNKNOWN pngcheck-cve202027818-dos(193591) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220529 [SECURITY] [DLA 3032-1] pngcheck security update | ||||||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||||||