Vulnerability Change Records for CVE-2016-2191

Change History

CVE Modified by Red Hat, Inc. 11/28/2016 3:3:46 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://security.gentoo.org/glsa/201608-01 [No Types Assigned]

CVE Modified by Source 7/28/2016 9:59:57 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.html
Added Reference

								
							
							
						
http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.html

Modified Analysis 4/18/2016 11:26:05 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
Configuration 1
     OR
          *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:optipng:optipng:0.7.2:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
CWE-119
Changed Reference Type
http://packetstormsecurity.com/files/136553/Optipng-Invalid-Write.html No Types Assigned
http://packetstormsecurity.com/files/136553/Optipng-Invalid-Write.html Exploit
Changed Reference Type
https://sourceforge.net/p/optipng/bugs/59/ No Types Assigned
https://sourceforge.net/p/optipng/bugs/59/ Patch

CVE Modified by Red Hat, Inc. 10/09/2018 3:59:37 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/archive/1/537972/100/0/threaded [No Types Assigned]
Removed Reference
http://www.securityfocus.com/archive/1/archive/1/537972/100/0/threaded [Third Party Advisory]

								
						

CVE Modified by Source 4/21/2016 9:59:42 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.ubuntu.com/usn/USN-2951-1

Modified Analysis 5/25/2016 2:20:33 PM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:optipng:optipng:0.7.2:*:*:*:*:*:*:*
Configuration 1
     OR
          *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Configuration 3
     OR
          *cpe:2.3:a:optipng:optipng:0.7.2:*:*:*:*:*:*:*

Initial CVE Analysis 4/15/2016 3:34:25 PM

Action Type Old Value New Value

CPE Deprecation Remap 10/30/2018 12:27:36 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

CPE Deprecation Remap 10/30/2018 12:27:32 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:novell:leap:42.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*