Vulnerability Description
Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pngquant | Pngquant | 2.7.0 |
Related Weaknesses (CWE)
References
- http://sf.snu.ac.kr/gil.hur/publications/shovel.pdfExploitTechnical DescriptionThird Party Advisory
- https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be2PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html
- http://sf.snu.ac.kr/gil.hur/publications/shovel.pdfExploitTechnical DescriptionThird Party Advisory
- https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be2PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/06/msg00028.html
FAQ
What is CVE-2016-5735?
CVE-2016-5735 is a vulnerability with a CVSS score of 7.8 (HIGH). Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
How severe is CVE-2016-5735?
CVE-2016-5735 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5735?
Check the references section above for vendor advisories and patch information. Affected products include: Pngquant Pngquant.