Numeric Errors Affecting libpng-devel package, versions <2:1.2.10-7.1.el5_3.2


Severity

Recommended
medium

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
4.43% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-LIBPNGDEVEL-2450094
  • published10 Apr 2022
  • disclosed14 Apr 2008

Introduced: 14 Apr 2008

CVE-2008-1382  (opens in a new tab)
CWE-189  (opens in a new tab)

How to fix?

Upgrade Oracle:5 libpng-devel to version 2:1.2.10-7.1.el5_3.2 or higher.
This issue was patched in ELSA-2009-0333.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpng-devel package and not the libpng-devel package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.

References

CVSS Scores

version 3.1