← Zuruck zu CVEs
CVE-2015-7981
N/ABeschreibung
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht11/24/2015
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxlibpng:libpngredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_hpc_node_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Schwachen (CWE)
CWE-200
Referenzen
http://rhn.redhat.com/errata/RHSA-2015-2594.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(cve@mitre.org)
http://sourceforge.net/p/libpng/bugs/241/(cve@mitre.org)
http://www.debian.org/security/2015/dsa-3399(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/3(cve@mitre.org)
http://www.securityfocus.com/bid/77304(cve@mitre.org)
http://www.securitytracker.com/id/1034393(cve@mitre.org)
http://www.ubuntu.com/usn/USN-2815-1(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2016:1430(cve@mitre.org)
https://security.gentoo.org/glsa/201611-08(cve@mitre.org)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2594.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/p/libpng/bugs/241/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2015/dsa-3399(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/77304(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034393(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2815-1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2016:1430(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201611-08(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.