cve/2004/CVE-2004-0597.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2004-0597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0597)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
### POC
#### Reference
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009
#### Github
- https://github.com/DSTCyber/from-crashes-to-exploits
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-
- https://github.com/sdukshis/protecting-cpp-workshop