← Voltar para CVEs
CVE-2015-7981
N/ADescricao
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado11/24/2015
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxlibpng:libpngredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_hpc_node_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstation
Fraquezas (CWE)
CWE-200
Referencias
http://rhn.redhat.com/errata/RHSA-2015-2594.html(cve@mitre.org)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(cve@mitre.org)
http://sourceforge.net/p/libpng/bugs/241/(cve@mitre.org)
http://www.debian.org/security/2015/dsa-3399(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/10/26/3(cve@mitre.org)
http://www.securityfocus.com/bid/77304(cve@mitre.org)
http://www.securitytracker.com/id/1034393(cve@mitre.org)
http://www.ubuntu.com/usn/USN-2815-1(cve@mitre.org)
https://access.redhat.com/errata/RHSA-2016:1430(cve@mitre.org)
https://security.gentoo.org/glsa/201611-08(cve@mitre.org)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2594.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2015-2595.html(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/p/libpng/bugs/241/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2015/dsa-3399(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/10/26/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/77304(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034393(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2815-1(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2016:1430(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201611-08(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.