U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2007-2445 Detail

Description

The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
http://docs.info.apple.com/article.html?artnum=307562
http://docs.info.apple.com/article.html?artnum=307562
http://irrlicht.sourceforge.net/changes.txt
http://irrlicht.sourceforge.net/changes.txt
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://openpkg.com/go/OpenPKG-SA-2007.013
http://openpkg.com/go/OpenPKG-SA-2007.013
http://osvdb.org/36196
http://osvdb.org/36196
http://secunia.com/advisories/25268 Vendor Advisory 
http://secunia.com/advisories/25268 Vendor Advisory 
http://secunia.com/advisories/25273 Vendor Advisory 
http://secunia.com/advisories/25273 Vendor Advisory 
http://secunia.com/advisories/25292 Vendor Advisory 
http://secunia.com/advisories/25292 Vendor Advisory 
http://secunia.com/advisories/25329 Vendor Advisory 
http://secunia.com/advisories/25329 Vendor Advisory 
http://secunia.com/advisories/25353
http://secunia.com/advisories/25353
http://secunia.com/advisories/25461
http://secunia.com/advisories/25461
http://secunia.com/advisories/25554
http://secunia.com/advisories/25554
http://secunia.com/advisories/25571
http://secunia.com/advisories/25571
http://secunia.com/advisories/25742
http://secunia.com/advisories/25742
http://secunia.com/advisories/25787
http://secunia.com/advisories/25787
http://secunia.com/advisories/25867
http://secunia.com/advisories/25867
http://secunia.com/advisories/27056
http://secunia.com/advisories/27056
http://secunia.com/advisories/29420
http://secunia.com/advisories/29420
http://secunia.com/advisories/30161
http://secunia.com/advisories/30161
http://secunia.com/advisories/31168
http://secunia.com/advisories/31168
http://secunia.com/advisories/34388
http://secunia.com/advisories/34388
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624 Patch 
http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624 Patch 
http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624 Patch 
http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624 Patch 
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
http://www.coresecurity.com/?action=item&id=2148
http://www.coresecurity.com/?action=item&id=2148
http://www.debian.org/security/2008/dsa-1613
http://www.debian.org/security/2008/dsa-1613
http://www.debian.org/security/2009/dsa-1750
http://www.debian.org/security/2009/dsa-1750
http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
http://www.kb.cert.org/vuls/id/684664 Third Party Advisory  US Government Resource 
http://www.kb.cert.org/vuls/id/684664 Third Party Advisory  US Government Resource 
http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt Vendor Advisory 
http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt Vendor Advisory 
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0356.html
http://www.redhat.com/support/errata/RHSA-2007-0356.html
http://www.securityfocus.com/archive/1/468910/100/0/threaded
http://www.securityfocus.com/archive/1/468910/100/0/threaded
http://www.securityfocus.com/archive/1/489135/100/0/threaded
http://www.securityfocus.com/archive/1/489135/100/0/threaded
http://www.securityfocus.com/bid/24000
http://www.securityfocus.com/bid/24000
http://www.securityfocus.com/bid/24023
http://www.securityfocus.com/bid/24023
http://www.securitytracker.com/id?1018078
http://www.securitytracker.com/id?1018078
http://www.trustix.org/errata/2007/0019/
http://www.trustix.org/errata/2007/0019/
http://www.ubuntu.com/usn/usn-472-1
http://www.ubuntu.com/usn/usn-472-1
http://www.vupen.com/english/advisories/2007/1838
http://www.vupen.com/english/advisories/2007/1838
http://www.vupen.com/english/advisories/2007/2385
http://www.vupen.com/english/advisories/2007/2385
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/0924/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
https://issues.rpath.com/browse/RPL-1381
https://issues.rpath.com/browse/RPL-1381
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

7 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2007-2445
NVD Published Date:
05/16/2007
NVD Last Modified:
11/20/2024
Source:
Red Hat, Inc.