Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
References
Link | Resource |
---|---|
http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf | Exploit Technical Description Third Party Advisory |
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html | |
http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf | Exploit Technical Description Third Party Advisory |
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html |
Configurations
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf - Exploit, Technical Description, Third Party Advisory | |
References | () https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html - |
Information
Published : 2017-05-23 04:29
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5735
Mitre link : CVE-2016-5735
CVE.ORG link : CVE-2016-5735
JSON object : View
Products Affected
pngquant
- pngquant
CWE
CWE-190
Integer Overflow or Wraparound