CVE-2015-8540
Publication date 11 December 2015
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
14.04 LTS trusty | Not in release | |
firefox | ||
14.04 LTS trusty | Not in release | |
libpng | ||
14.04 LTS trusty |
Fixed 1.2.50-1ubuntu2.14.04.2
|
|
thunderbird | ||
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
libpng |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-2861-1
- libpng vulnerabilities
- 6 January 2016