{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-03-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-01-09T17:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"FEDORA-2012-3545","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html"},{"name":"49660","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49660"},{"name":"RHSA-2012:0407","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0407.html"},{"name":"MDVSA-2012:033","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:033"},{"name":"FEDORA-2012-3507","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html"},{"name":"DSA-2439","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2012/dsa-2439"},{"name":"FEDORA-2012-3605","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html"},{"name":"48320","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48320"},{"tags":["x_refsource_CONFIRM"],"url":"http://src.chromium.org/viewvc/chrome?view=rev&revision=125311"},{"name":"FEDORA-2012-3739","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html"},{"name":"FEDORA-2012-3536","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html"},{"name":"openSUSE-SU-2012:0466","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html"},{"name":"GLSA-201206-15","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-201206-15.xml"},{"name":"RHSA-2012:0488","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0488.html"},{"name":"oval:org.mitre.oval:def:14763","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=799000"},{"name":"48485","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48485"},{"tags":["x_refsource_CONFIRM"],"url":"http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b"},{"name":"48554","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48554"},{"name":"openSUSE-SU-2012:0432","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://code.google.com/p/chromium/issues/detail?id=116162"},{"name":"1026823","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1026823"},{"name":"FEDORA-2012-3705","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html"},{"name":"48512","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/48512"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2011-3045","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"FEDORA-2012-3545","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html"},{"name":"49660","refsource":"SECUNIA","url":"http://secunia.com/advisories/49660"},{"name":"RHSA-2012:0407","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2012-0407.html"},{"name":"MDVSA-2012:033","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:033"},{"name":"FEDORA-2012-3507","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html"},{"name":"DSA-2439","refsource":"DEBIAN","url":"http://www.debian.org/security/2012/dsa-2439"},{"name":"FEDORA-2012-3605","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html"},{"name":"48320","refsource":"SECUNIA","url":"http://secunia.com/advisories/48320"},{"name":"http://src.chromium.org/viewvc/chrome?view=rev&revision=125311","refsource":"CONFIRM","url":"http://src.chromium.org/viewvc/chrome?view=rev&revision=125311"},{"name":"FEDORA-2012-3739","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html"},{"name":"FEDORA-2012-3536","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html"},{"name":"openSUSE-SU-2012:0466","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html"},{"name":"GLSA-201206-15","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-201206-15.xml"},{"name":"RHSA-2012:0488","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2012-0488.html"},{"name":"oval:org.mitre.oval:def:14763","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=799000","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=799000"},{"name":"48485","refsource":"SECUNIA","url":"http://secunia.com/advisories/48485"},{"name":"http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html","refsource":"CONFIRM","url":"http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html"},{"name":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b","refsource":"CONFIRM","url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b"},{"name":"48554","refsource":"SECUNIA","url":"http://secunia.com/advisories/48554"},{"name":"openSUSE-SU-2012:0432","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html"},{"name":"http://code.google.com/p/chromium/issues/detail?id=116162","refsource":"CONFIRM","url":"http://code.google.com/p/chromium/issues/detail?id=116162"},{"name":"1026823","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1026823"},{"name":"FEDORA-2012-3705","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html"},{"name":"48512","refsource":"SECUNIA","url":"http://secunia.com/advisories/48512"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T23:22:27.386Z"},"title":"CVE Program Container","references":[{"name":"FEDORA-2012-3545","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html"},{"name":"49660","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49660"},{"name":"RHSA-2012:0407","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0407.html"},{"name":"MDVSA-2012:033","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:033"},{"name":"FEDORA-2012-3507","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html"},{"name":"DSA-2439","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2012/dsa-2439"},{"name":"FEDORA-2012-3605","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html"},{"name":"48320","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48320"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://src.chromium.org/viewvc/chrome?view=rev&revision=125311"},{"name":"FEDORA-2012-3739","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html"},{"name":"FEDORA-2012-3536","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html"},{"name":"openSUSE-SU-2012:0466","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html"},{"name":"GLSA-201206-15","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-201206-15.xml"},{"name":"RHSA-2012:0488","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0488.html"},{"name":"oval:org.mitre.oval:def:14763","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=799000"},{"name":"48485","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48485"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b"},{"name":"48554","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48554"},{"name":"openSUSE-SU-2012:0432","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://code.google.com/p/chromium/issues/detail?id=116162"},{"name":"1026823","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1026823"},{"name":"FEDORA-2012-3705","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html"},{"name":"48512","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/48512"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-195","lang":"en","description":"CWE-195 Signed to Unsigned Conversion Error"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-06-09T15:35:38.664911Z","id":"CVE-2011-3045","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-09T15:35:52.219Z"}}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2011-3045","datePublished":"2012-03-22T16:00:00.000Z","dateReserved":"2011-08-09T00:00:00.000Z","dateUpdated":"2025-06-09T15:35:52.219Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}