Vulnerability Description
Integer overflow bug in function minitiff_read_info() of optipng 0.7.6 allows an attacker to remotely execute code or cause denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Optipng Project | Optipng | 0.7.6 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2017/11/msg00030.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201801-02Third Party Advisory
- https://sourceforge.net/p/optipng/bugs/65/ExploitThird Party Advisory
- https://www.debian.org/security/2017/dsa-4058Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/11/msg00030.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201801-02Third Party Advisory
- https://sourceforge.net/p/optipng/bugs/65/ExploitThird Party Advisory
- https://www.debian.org/security/2017/dsa-4058Third Party Advisory
FAQ
What is CVE-2017-1000229?
CVE-2017-1000229 is a vulnerability with a CVSS score of 7.8 (HIGH). Integer overflow bug in function minitiff_read_info() of optipng 0.7.6 allows an attacker to remotely execute code or cause denial of service.
How severe is CVE-2017-1000229?
CVE-2017-1000229 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000229?
Check the references section above for vendor advisories and patch information. Affected products include: Optipng Project Optipng, Debian Debian Linux.