Description
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- required
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- none
- Availability
- high
- Weaknesses
- CWE-190CWE-369
Metadata
- Primary Vendor
- LIBPNG
- Published
- 7/9/2018
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
libpng : libpngcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxoracle : jdkoracle : jdkoracle : jdkoracle : jdkoracle : jreoracle : jreoracle : jreoracle : jreredhat : enterprise_linux_desktopredhat : enterprise_linux_desktopredhat : enterprise_linux_serverredhat : enterprise_linux_serverredhat : enterprise_linux_workstationredhat : enterprise_linux_workstation
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.