CVE-2018-13785 — Integer Overflow or Wraparound in Libpng
Severity
6.5MEDIUMNVD
OSV7.5
EPSS
2.9%
top 13.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 9
Latest updateMay 13
Description
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6
Affected Packages7 packages
Also affects: Ubuntu Linux 14.04, 16.04, 17.10, 18.04
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3💬Community
8Bugzilla▶
CVE-2018-13785 libpng10: libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service [fedora-all]↗2018-07-11
Bugzilla▶
CVE-2018-13785 mingw-libpng: libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service [epel-7]↗2018-07-11
Bugzilla▶
CVE-2018-13785 mingw-libpng: libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service [fedora-all]↗2018-07-11
Bugzilla▶
CVE-2018-13785 libpng15: libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service [fedora-all]↗2018-07-11
Bugzilla▶
CVE-2018-13785 libpng12: libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service [fedora-all]↗2018-07-11