Vulnerability Description
Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Optipng Project | Optipng | <= 0.7.5 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://bugs.fi/media/afl/optipng/1/Exploit
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.htmlMailing ListThird Party Advisory
- http://www.debian.org/security/2016/dsa-3546Third Party Advisory
- http://www.ubuntu.com/usn/USN-2951-1Third Party Advisory
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/56/Issue TrackingPatchThird Party Advisory
- http://bugs.fi/media/afl/optipng/1/Exploit
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.htmlMailing ListThird Party Advisory
- http://www.debian.org/security/2016/dsa-3546Third Party Advisory
- http://www.ubuntu.com/usn/USN-2951-1Third Party Advisory
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/56/Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2016-3981?
CVE-2016-3981 is a vulnerability with a CVSS score of 7.8 (HIGH). Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or po...
How severe is CVE-2016-3981?
CVE-2016-3981 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3981?
Check the references section above for vendor advisories and patch information. Affected products include: Optipng Project Optipng, Canonical Ubuntu Linux, Debian Debian Linux.