{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2011-07-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-28T12:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"49660","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49660"},{"name":"RHSA-2011:1103","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1103.html"},{"name":"48618","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/48618"},{"name":"45046","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45046"},{"name":"USN-1175-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-1175-1"},{"name":"MDVSA-2011:151","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=720612"},{"tags":["x_refsource_CONFIRM"],"url":"http://sourceforge.net/mailarchive/forum.php?thread_name=003101cc2790%24fb5d6e80%24f2184b80%24%40acm.org&forum_name=png-mng-implement"},{"name":"GLSA-201206-15","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-201206-15.xml"},{"name":"45461","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45461"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.libpng.org/pub/png/libpng.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339"},{"name":"FEDORA-2011-9336","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"},{"name":"DSA-2287","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2011/dsa-2287"},{"name":"APPLE-SA-2011-10-12-3","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"},{"name":"45405","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45405"},{"name":"45445","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45445"},{"name":"RHSA-2011:1105","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1105.html"},{"name":"45460","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45460"},{"name":"[oss-security] 20110713 Security issues fixed in libpng 1.5.4","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/07/13/2"},{"name":"libpng-png-file-dos(68536)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/68536"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT5002"},{"name":"45492","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45492"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.apple.com/kb/HT5281"},{"name":"RHSA-2011:1104","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1104.html"},{"name":"VU#819894","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/819894"},{"name":"APPLE-SA-2012-05-09-1","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"},{"name":"45415","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/45415"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T23:08:23.757Z"},"title":"CVE Program Container","references":[{"name":"49660","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49660"},{"name":"RHSA-2011:1103","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1103.html"},{"name":"48618","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/48618"},{"name":"45046","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45046"},{"name":"USN-1175-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1175-1"},{"name":"MDVSA-2011:151","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:151"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=720612"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://sourceforge.net/mailarchive/forum.php?thread_name=003101cc2790%24fb5d6e80%24f2184b80%24%40acm.org&forum_name=png-mng-implement"},{"name":"GLSA-201206-15","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-201206-15.xml"},{"name":"45461","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45461"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.libpng.org/pub/png/libpng.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339"},{"name":"FEDORA-2011-9336","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063118.html"},{"name":"DSA-2287","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2011/dsa-2287"},{"name":"APPLE-SA-2011-10-12-3","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html"},{"name":"45405","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45405"},{"name":"45445","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45445"},{"name":"RHSA-2011:1105","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1105.html"},{"name":"45460","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45460"},{"name":"[oss-security] 20110713 Security issues fixed in libpng 1.5.4","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/07/13/2"},{"name":"libpng-png-file-dos(68536)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/68536"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT5002"},{"name":"45492","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45492"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.apple.com/kb/HT5281"},{"name":"RHSA-2011:1104","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2011-1104.html"},{"name":"VU#819894","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/819894"},{"name":"APPLE-SA-2012-05-09-1","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"},{"name":"45415","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/45415"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-2692","datePublished":"2011-07-17T20:00:00.000Z","dateReserved":"2011-07-11T00:00:00.000Z","dateUpdated":"2024-08-06T23:08:23.757Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}