Improper Handling of Highly Compressed Data (Data Amplification) Affecting libpng-static package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
1.55% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL6-LIBPNGSTATIC-1326365
  • published26 Jul 2021
  • disclosed1 Mar 2010

Introduced: 1 Mar 2010

CVE-2010-0205  (opens in a new tab)
CWE-409  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:6 libpng-static.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpng-static package and not the libpng-static package as distributed by RHEL. See How to fix? for RHEL:6 relevant fixed versions and status.

The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.

References

CVSS Scores

version 3.1