An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.
References
Link | Resource |
---|---|
https://github.com/gemini-testing/png-img | Product |
https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d | Patch Third Party Advisory |
https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0 | Release Notes Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-19T23:05:09
Updated: 2021-02-19T23:05:09
Reserved: 2020-11-06T00:00:00
Link: CVE-2020-28248
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-20T00:15:12.483
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-28248
JSON object: View
Redhat Information
No data.