Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-6218

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-20 Feb, 2009 | 17:00
Updated At-07 Aug, 2024 | 11:20
Rejected At-
Credits

Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:20 Feb, 2009 | 17:00
Updated At:07 Aug, 2024 | 11:20
Rejected At:
▼CVE Numbering Authority (CNA)

Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/46115
vdb-entry
x_refsource_XF
http://security.gentoo.org/glsa/glsa-200903-28.xml
vendor-advisory
x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
vendor-advisory
x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2008/2917
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/bid/31920
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2010/1837
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/34388
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/32418
third-party-advisory
x_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624
x_refsource_CONFIRM
http://secunia.com/advisories/34265
third-party-advisory
x_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?release_id=635837
x_refsource_CONFIRM
http://wiki.rpath.com/Advisories:rPSA-2009-0046
x_refsource_CONFIRM
http://www.securitytracker.com/id?1021104
vdb-entry
x_refsource_SECTRACK
http://www.debian.org/security/2009/dsa-1750
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/501767/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/34320
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46115
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://security.gentoo.org/glsa/glsa-200903-28.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.vupen.com/english/advisories/2008/2917
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/bid/31920
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.vupen.com/english/advisories/2010/1837
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/34388
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/32418
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/34265
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635837
Resource:
x_refsource_CONFIRM
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0046
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id?1021104
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.debian.org/security/2009/dsa-1750
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/archive/1/501767/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/34320
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/46115
vdb-entry
x_refsource_XF
x_transferred
http://security.gentoo.org/glsa/glsa-200903-28.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.vupen.com/english/advisories/2008/2917
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/bid/31920
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2010/1837
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/34388
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/32418
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/34265
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://sourceforge.net/project/shownotes.php?release_id=635837
x_refsource_CONFIRM
x_transferred
http://wiki.rpath.com/Advisories:rPSA-2009-0046
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id?1021104
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.debian.org/security/2009/dsa-1750
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/archive/1/501767/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/34320
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46115
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200903-28.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2917
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/31920
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/1837
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/34388
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/32418
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/34265
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635837
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0046
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id?1021104
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.debian.org/security/2009/dsa-1750
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/501767/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/34320
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:20 Feb, 2009 | 17:30
Updated At:11 Oct, 2018 | 20:57

Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.1HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.1
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C
CPE Matches

libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.0
cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.1
cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.2
cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.3
cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.4
cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.4
cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.4
cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.4
cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.4
cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.5
cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*
libpng
libpng
>>libpng>>1.2.6
cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2009-06-03T00:00:00

Red Hat does not consider this bug a security flaw. For more details please see the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=468990

References
HyperlinkSourceResource
http://secunia.com/advisories/32418cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/34265cve@mitre.org
N/A
http://secunia.com/advisories/34320cve@mitre.org
N/A
http://secunia.com/advisories/34388cve@mitre.org
N/A
http://security.gentoo.org/glsa/glsa-200903-28.xmlcve@mitre.org
N/A
http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624cve@mitre.org
Patch
http://sourceforge.net/project/shownotes.php?release_id=635837cve@mitre.org
Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0046cve@mitre.org
N/A
http://www.debian.org/security/2009/dsa-1750cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/501767/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/31920cve@mitre.org
N/A
http://www.securitytracker.com/id?1021104cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2917cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2010/1837cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/46115cve@mitre.org
N/A
Hyperlink: http://secunia.com/advisories/32418
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/34265
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34320
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/34388
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200903-28.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://sourceforge.net/project/shownotes.php?release_id=635837
Source: cve@mitre.org
Resource:
Patch
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0046
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2009/dsa-1750
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/501767/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/31920
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1021104
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2917
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/1837
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46115
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found