Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
References
Link | Resource |
---|---|
http://sf.snu.ac.kr/gil.hur/publications/shovel.pdf | Exploit Technical Description Third Party Advisory |
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-23T03:56:00
Updated: 2020-06-28T14:06:06
Reserved: 2016-06-21T00:00:00
Link: CVE-2016-5735
JSON object: View
NVD Information
Status : Modified
Published: 2017-05-23T04:29:01.477
Modified: 2020-06-28T15:15:10.620
Link: CVE-2016-5735
JSON object: View
Redhat Information
No data.
CWE