Vulnerabilities > Greg Roelofs > Libpng > 1.2.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-11-17 | CVE-2006-5793 | Improper Input Validation vulnerability in Greg Roelofs Libpng The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. | 2.6 |
2006-06-30 | CVE-2006-3334 | Buffer Overflow vulnerability in Libpng Graphics Library Chunk Error Processing Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". | 7.5 |
2002-12-26 | CVE-2002-1363 | Buffer Overflow vulnerability in LibPNG Incorrect Offset Calculation Portable Network Graphics (PNG) library libpng 1.2.5 and earlier does not correctly calculate offsets, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a buffer overflow attack on the row buffers. | 7.5 |
2002-08-12 | CVE-2002-0728 | Unspecified vulnerability in Greg Roelofs Libpng 1.0.14/1.2.4 Buffer overflow in the progressive reader for libpng 1.2.x before 1.2.4, and 1.0.x before 1.0.14, allows attackers to cause a denial of service (crash) via a PNG data stream that has more IDAT data than indicated by the IHDR chunk. | 5.0 |