CVE-2018-13785

Name
CVE-2018-13785
Description
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://sourceforge.net/p/libpng/bugs/278/
Patch https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
Third Party Advisory https://usn.ubuntu.com/3712-1/
Patch http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Third Party Advisory http://www.securitytracker.com/id/1041889
Third Party Advisory http://www.securityfocus.com/bid/105599
Third Party Advisory https://security.netapp.com/advisory/ntap-20181018-0001/
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3008
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3007
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3003
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3002
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3001
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3000
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3534
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3533
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3672
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3671
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3779
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3852
GENTOO https://security.gentoo.org/glsa/201908-10

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libpng:libpng:1.6.34:*:*:*:*:*:*:* libpng == None == 1.6.34

Vulnerable and fixed packages

Source package Branch Version Maintainer Status