Total vulnerabilities in the database
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
Software | From | Fixed in |
---|---|---|
libpng / libpng | 1.5.0 | 1.5.4 |
libpng / libpng | 1.4.0 | 1.4.8 |
libpng / libpng | 1.2.0 | 1.2.45 |
libpng / libpng | 1.0.0 | 1.0.55 |
fedoraproject / fedora | 14 | 14.x |
debian / debian_linux | 5.0 | 5.0.x |
debian / debian_linux | 6.0 | 6.0.x |
canonical / ubuntu_linux | 10.10 | 10.10.x |
canonical / ubuntu_linux | 11.04 | 11.04.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
canonical / ubuntu_linux | 8.04 | 8.04.x |