Rapid7 Vulnerability & Exploit Database

Mozilla security issue: buffer and integer overflows in libpng

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Mozilla security issue: buffer and integer overflows in libpng

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
11/23/2004
Created
07/25/2018
Added
01/06/2005
Modified
02/13/2015

Description

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

Solution(s)

  • mozilla-firefox-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;