Vulnerability Description
Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libpng | Libpng | < 1.2.44 |
| Chrome | < 5.0.375.99 | |
| Apple | Itunes | < 10.2 |
| Apple | Safari | < 5.0.4 |
| Apple | Iphone Os | >= 2.0, <= 4.1 |
| Apple | Mac Os X | >= 10.6.0, < 10.6.4 |
| Apple | Mac Os X Server | >= 10.6.0, < 10.6.4 |
| Fedoraproject | Fedora | 12 |
| Opensuse | Opensuse | 11.1 |
| Suse | Linux Enterprise Server | 9 |
| Vmware | Player | >= 2.5, < 2.5.5 |
| Vmware | Workstation | >= 6.5.0, < 6.5.5 |
| Canonical | Ubuntu Linux | 6.06 |
| Debian | Debian Linux | 5.0 |
| Mozilla | Firefox | < 3.5.11 |
| Mozilla | Seamonkey | < 2.0.6 |
| Mozilla | Thunderbird | < 3.0.6 |
Related Weaknesses (CWE)
References
- http://blackberry.com/btsc/KB27244Broken Link
- http://code.google.com/p/chromium/issues/detail?id=45983ExploitIssue TrackingMailing List
- http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.htmlRelease NotesThird Party Advisory
- http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.htmlMailing ListThird Party Advisory
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlMailing ListThird Party Advisory
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.htmlMailing ListThird Party Advisory
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.htmlMailing ListThird Party Advisory
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlMailing ListThird Party Advisory
- http://lists.vmware.com/pipermail/security-announce/2010/000105.htmlMailing ListPatchThird Party Advisory
- http://secunia.com/advisories/40302Broken Link
- http://secunia.com/advisories/40336Broken Link
FAQ
What is CVE-2010-1205?
CVE-2010-1205 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers ...
How severe is CVE-2010-1205?
CVE-2010-1205 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2010-1205?
Check the references section above for vendor advisories and patch information. Affected products include: Libpng Libpng, Google Chrome, Apple Itunes, Apple Safari, Apple Iphone Os.