### [CVE-2004-0597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0597) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking. ### POC #### Reference - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-009 #### Github - https://github.com/DSTCyber/from-crashes-to-exploits - https://github.com/mudongliang/LinuxFlaw - https://github.com/oneoy/cve- - https://github.com/sdukshis/protecting-cpp-workshop