CVE-2016-5735

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pngquant:pngquant:2.7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf - Exploit, Technical Description, Third Party Advisory () http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf - Exploit, Technical Description, Third Party Advisory
References () https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 - Patch, Third Party Advisory () https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html - () https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html -

Information

Published : 2017-05-23 04:29

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5735

Mitre link : CVE-2016-5735

CVE.ORG link : CVE-2016-5735


JSON object : View

Products Affected

pngquant

  • pngquant
CWE
CWE-190

Integer Overflow or Wraparound