← Retour aux CVEs
CVE-2015-7981
N/ADescription
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
Details CVE
Score CVSS v3.1N/A
Publie11/24/2015
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxlibpng:libpngredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_hpc_node_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-200
References
http://rhn.redhat.com/errata/RHSA-2015-2594.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(cve@mitre.org)
http://sourceforge.net/p/libpng/bugs/241/(cve@mitre.org)
http://www.debian.org/security/2015/dsa-3399(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/3(cve@mitre.org)
http://www.securityfocus.com/bid/77304(cve@mitre.org)
http://www.securitytracker.com/id/1034393(cve@mitre.org)
http://www.ubuntu.com/usn/USN-2815-1(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2016:1430(cve@mitre.org)
https://security.gentoo.org/glsa/201611-08(cve@mitre.org)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2594.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/p/libpng/bugs/241/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2015/dsa-3399(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/77304(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034393(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2815-1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2016:1430(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201611-08(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.