CVE编号
CVE-2006-5793利用情况
暂无补丁情况
官方补丁披露时间
2006-11-18漏洞描述
libpng 1.0.6到1.2.12中的sPLT块处理代码(在pngset.c中的png_set_sPLT函数)在错误的数据类型上使用了sizeof运算符,这允许上下文相关的攻击者通过格式错误的sPLT导致拒绝服务(崩溃)触发越界读取的块。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-rel... | |
http://bugs.gentoo.org/attachment.cgi?id=101400&action=view | |
http://bugs.gentoo.org/show_bug.cgi?id=154380 | |
http://docs.info.apple.com/article.html?artnum=307562 | |
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html | |
http://secunia.com/advisories/22889 | |
http://secunia.com/advisories/22900 | |
http://secunia.com/advisories/22941 | |
http://secunia.com/advisories/22950 | |
http://secunia.com/advisories/22951 | |
http://secunia.com/advisories/22956 | |
http://secunia.com/advisories/22958 | |
http://secunia.com/advisories/23208 | |
http://secunia.com/advisories/23335 | |
http://secunia.com/advisories/25329 | |
http://secunia.com/advisories/25742 | |
http://secunia.com/advisories/29420 | |
http://security.gentoo.org/glsa/glsa-200611-09.xml | |
http://securitytracker.com/id?1017244 | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackw... | |
http://sourceforge.net/project/shownotes.php?release_id=464278 | |
http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm | |
http://www.coresecurity.com/?action=item&id=2148 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:209 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:210 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:211 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:212 | |
http://www.novell.com/linux/security/advisories/2006_28_sr.html | |
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.036.html | |
http://www.redhat.com/support/errata/RHSA-2007-0356.html | |
http://www.securityfocus.com/archive/1/451874/100/200/threaded | |
http://www.securityfocus.com/archive/1/453484/100/100/threaded | |
http://www.securityfocus.com/archive/1/489135/100/0/threaded | |
http://www.securityfocus.com/bid/21078 | |
http://www.trustix.org/errata/2006/0065/ | |
http://www.ubuntu.com/usn/usn-383-1 | |
http://www.vupen.com/english/advisories/2006/4521 | |
http://www.vupen.com/english/advisories/2006/4568 | |
http://www.vupen.com/english/advisories/2008/0924/references | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30290 | |
https://issues.rpath.com/browse/RPL-790 | |
https://issues.rpath.com/browse/RPL-824 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.0.6 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.0.7 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.0.8 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.0.9 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.1 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.10 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.11 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.12 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.2 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.3 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.4 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.5 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.6 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.7 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.7rc1 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.8 | - | |||||
运行在以下环境 | |||||||||
应用 | greg_roelofs | libpng | 1.2.9 | - | |||||
运行在以下环境 | |||||||||
系统 | oracle_5 | libpng | * |
Up to (excluding) 1.2.10-7.0.2 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | libpng-devel | * |
Up to (excluding) 1.2.10-7.0.2 |
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 -
还没有评论,来说两句吧...