Access of Uninitialized Pointer Affecting libpng-devel package, versions <2:1.2.10-7.1.el5_3.2


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
9.1% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-LIBPNGDEVEL-2450118
  • published10 Apr 2022
  • disclosed22 Feb 2009

Introduced: 22 Feb 2009

CVE-2009-0040  (opens in a new tab)
CWE-824  (opens in a new tab)

How to fix?

Upgrade Oracle:5 libpng-devel to version 2:1.2.10-7.1.el5_3.2 or higher.
This issue was patched in ELSA-2009-0333.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpng-devel package and not the libpng-devel package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.

References

CVSS Scores

version 3.1