CVE-2004-0598

Current Description

The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference.

Basic Data

PublishedNovember 23, 2004
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGreg RoelofsLibpng********1.2.5

Vulnerable Software List

VendorProductVersions
Greg Roelofs Libpng *

References

NameSourceURLTags
CLA-2004:856http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000856CONECTIVA
APPLE-SA-2004-09-09http://lists.apple.com/mhonarc/security-announce/msg00056.htmlAPPLE
20040804 [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png)http://marc.info/?l=bugtraq&m=109163866717909&w=2BUGTRAQ
SSRT4778http://marc.info/?l=bugtraq&m=109181639602978&w=2HP
SCOSA-2004.16http://marc.info/?l=bugtraq&m=109761239318458&w=2SCO
http://scary.beasts.org/security/CESA-2004-001.txthttp://scary.beasts.org/security/CESA-2004-001.txtMISCExploit Vendor Advisory
22957http://secunia.com/advisories/22957SECUNIA
22958http://secunia.com/advisories/22958SECUNIA
200663http://sunsolve.sun.com/search/document.do?assetkey=1-66-200663-1SUNALERT
DSA-536http://www.debian.org/security/2004/dsa-536DEBIANPATCH Vendor Advisory
GLSA-200408-03http://www.gentoo.org/security/en/glsa/glsa-200408-03.xmlGENTOOPATCH Vendor Advisory
GLSA-200408-22http://www.gentoo.org/security/en/glsa/glsa-200408-22.xmlGENTOOPATCH Vendor Advisory
VU#236656http://www.kb.cert.org/vuls/id/236656CERT-VNThird Party Advisory US Government Resource
MDKSA-2004:079http://www.mandriva.com/security/advisories?name=MDKSA-2004:079MANDRAKE
MDKSA-2006:212http://www.mandriva.com/security/advisories?name=MDKSA-2006:212MANDRIVA
MDKSA-2006:213http://www.mandriva.com/security/advisories?name=MDKSA-2006:213MANDRIVA
http://www.mozilla.org/projects/security/known-vulnerabilities.htmlhttp://www.mozilla.org/projects/security/known-vulnerabilities.htmlCONFIRM
SUSE-SA:2004:023http://www.novell.com/linux/security/advisories/2004_23_libpng.htmlSUSEPATCH Vendor Advisory
RHSA-2004:402http://www.redhat.com/support/errata/RHSA-2004-402.htmlREDHATVendor Advisory
RHSA-2004:429http://www.redhat.com/support/errata/RHSA-2004-429.htmlREDHATVendor Advisory
10857http://www.securityfocus.com/bid/10857BIDExploit PATCH Vendor Advisory
2004-0040http://www.trustix.net/errata/2004/0040/TRUSTIXVendor Advisory
TA04-217Ahttp://www.us-cert.gov/cas/techalerts/TA04-217A.htmlCERTThird Party Advisory US Government Resource
FLSA:1943https://bugzilla.fedora.us/show_bug.cgi?id=1943FEDORAPATCH
libpng-pnghandleiccp-dos(16895)https://exchange.xforce.ibmcloud.com/vulnerabilities/16895XF
oval:org.mitre.oval:def:10203https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10203OVAL
oval:org.mitre.oval:def:2572https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2572OVAL