CVE-2020-27818Classic Buffer Overflow in Pngcheck

Severity
3.3LOWNVD
EPSS
0.2%
top 63.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8
Latest updateJun 21

Description

A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:LExploitability: 1.8 | Impact: 1.4

Affected Packages5 packages

debiandebian/pngcheck< pngcheck 2.3.0-13 (bookworm)
Debianlibpng/pngcheck< 2.3.0-13+3
CVEListV5libpng/pngcheckpngcheck-2.4.0
NVDlibpng/pngcheck2.4.0

Also affects: Debian Linux 9.0, Fedora 31, 32, 33, 34

🔴Vulnerability Details

2
GHSA
GHSA-xjm9-9gr6-gcpx: A flaw was found in the check_chunk_name() function of pngcheck-22022-05-24
OSV
CVE-2020-27818: A flaw was found in the check_chunk_name() function of pngcheck-22020-12-08

📋Vendor Advisories

2
Ubuntu
pngcheck vulnerabilities2023-06-21
Debian
CVE-2020-27818: pngcheck - A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attack...2020
CVE-2020-27818 — Classic Buffer Overflow in Pngcheck | cvebase