2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2015-8540" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "[oss-security] 20151210 CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2015/12/10/6"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[oss-security] 20151210 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2015/12/10/7"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[oss-security] 20151211 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2015/12/11/1"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[oss-security] 20151211 Re: Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2015/12/11/2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[oss-security] 20151217 Re: CVE request - read underflow in libpng 1.2.55, 1.0.65, 1.4.18, and 1.5.25 (pngwutil.c)" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2015/12/17/10"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/p/libpng/bugs/244/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/p/libpng/bugs/244/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
} ,
2017-11-03 15:04:18 -04:00
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-3443" ,
"refsource" : "DEBIAN" ,
2017-11-03 15:04:18 -04:00
"url" : "http://www.debian.org/security/2016/dsa-3443"
} ,
2017-10-16 12:31:07 -04:00
{
2018-04-05 09:33:01 -04:00
"name" : "FEDORA-2015-3868cfa17b" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "GLSA-201611-08" ,
"refsource" : "GENTOO" ,
2017-10-16 12:31:07 -04:00
"url" : "https://security.gentoo.org/glsa/201611-08"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2016:1430" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "https://access.redhat.com/errata/RHSA-2016:1430"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "80592" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/80592"
}
]
}
}