Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow."
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://prdownloads.sourceforge.net/optipng/optipng-0.6.1.1.diff?download | x_refsource_CONFIRM |
| http://secunia.com/advisories/34259 | third-party-advisory x_refsource_SECUNIA |
| http://optipng.sourceforge.net/ | x_refsource_CONFIRM |
| http://openwall.com/lists/oss-security/2008/11/12/1 | mailing-list x_refsource_MLIST |
| http://www.securityfocus.com/bid/32248 | vdb-entry x_refsource_BID |
| http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html | vendor-advisory x_refsource_SUSE |
| http://security.gentoo.org/glsa/glsa-200812-01.xml | vendor-advisory x_refsource_GENTOO |
| http://www.vupen.com/english/advisories/2008/3108 | vdb-entry x_refsource_VUPEN |
| http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505399 | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/46519 | vdb-entry x_refsource_XF |
| http://sourceforge.net/project/shownotes.php?release_id=639631&group_id=151404 | x_refsource_CONFIRM |
| http://secunia.com/advisories/32651 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|