CVE-2010-2249

Scores

EPSS

0.016very_low1.6%
0%20%40%60%80%100%

Percentile: 1.6%

CVSS

6.5medium3.x
0246810

CVSS Score: 6.5/10

All CVSS Scores

CVSS 3.x
6.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Description

Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-401

Related Vulnerabilities

Exploits

Exploit ID: 14422

Source: exploitdb

URL: https://www.exploit-db.com/exploits/14422

Exploit ID: 25094

Source: exploitdb

URL: https://www.exploit-db.com/exploits/25094

Exploit ID: 389

Source: exploitdb

URL: https://www.exploit-db.com/exploits/389

Exploit ID: 393

Source: exploitdb

URL: https://www.exploit-db.com/exploits/393

Exploit ID: CVE-2010-1205

Source: github-poc

URL: https://github.com/mk219533/CVE-2010-1205

Vulnerable Software (21)

Type: Configuration

Product: firefox

Operating System: ubuntu hardy 8.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: libpng

Operating System: rhel 3

Trait:
{  "fixed": "1.2.2-30"}

Source: redhat

Type: Configuration

Product: libpng

Operating System: rhel 4

Trait:
{  "fixed": "1.2.7-3.el4_8.3"}

Source: redhat

Type: Configuration

Product: libpng

Operating System: rhel 5

Trait:
{  "fixed": "1.2.10-7.1.el5_5.3"}

Source: redhat

Type: Configuration

Product: libpng

Operating System: debian

Trait:
{  "fixed": "1.2.44-1"}

Source: debian

Type: Configuration

Product: libpng

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "1.2.15~beta5-3ubuntu0.3"}

Source: ubuntu

Type: Configuration

Product: libpng10

Operating System: rhel 3

Trait:
{  "fixed": "1.0.13-21"}

Source: redhat

Type: Configuration

Product: libpng10

Operating System: rhel 4

Trait:
{  "fixed": "1.0.16-3.el4_8.4"}

Source: redhat

Type: Configuration

Product: tuxonice-userui

Operating System: debian

Trait:
{  "fixed": "1.0-1"}

Source: debian

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: fedora

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",...

Source: nvd

Type: Configuration

Vendor: *

Product: iphone_os

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.2",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apple:safar...

Source: nvd

Type: Configuration

Vendor: *

Product: itunes

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.2",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apple:safar...

Source: nvd

Type: Configuration

Vendor: *

Product: libpng

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",      "versionEndExcluding": "1.2.44",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:libpng:l...

Source: nvd

Type: Configuration

Vendor: *

Product: linux_enterprise_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", ...

Source: nvd

Type: Configuration

Vendor: *

Product: opensuse

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", ...

Source: nvd

Type: Configuration

Vendor: *

Product: player

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",      "versionEndExcluding": "2.5.5",      "versionStartIncluding": "2.5",      "vulnerable": true    },    {...

Source: nvd

Type: Configuration

Vendor: *

Product: safari

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.2",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apple:safar...

Source: nvd

Type: Configuration

Vendor: *

Product: tvos

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.2",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apple:safar...

Source: nvd

Type: Configuration

Vendor: *

Product: ubuntu_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*...

Source: nvd