Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-0597

10 documents6 sources
Severity
10.0CRITICAL
EPSS
83.2%
top 0.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 23
Latest updateMay 3

Description

Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages4 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-pjf2-ggxp-rg8p: Multiple buffer overflows in libpng 12022-05-03
CVEList
CVE-2004-0597: Multiple buffer overflows in libpng 12004-08-05

💥Exploits & PoCs

3
Exploit-DB
Microsoft MSN Messenger 6.2.0137 - '.png' Remote Buffer Overflow2005-02-08
Exploit-DB
LibPNG 1.2.5 - 'png_jmpbuf()' Local Buffer Overflow2004-08-13
Exploit-DB
LibPNG Graphics Library - Remote Buffer Overflow2004-08-11

📋Vendor Advisories

1
Red Hat
security flaw2004-08-04

💬Community

3
Bugzilla
CVE-2004-0597 security flaw2018-08-16
Bugzilla
CAN-2004-0597/98/99 multiple problems in libpng 1.2.52004-07-14
Bugzilla
CAN-2004-0597/98/99 multiple problems in libpng 1.2.52004-07-14
CVE-2004-0597 (CRITICAL CVSS 10) | Multiple buffer overflows in libpng | cvebase.io