Vulnerability CVE-2018-13785: Information

Description

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

Severity: MEDIUM (6.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Published: July 9, 2018
Modified: June 27, 2022
Error type identifier: CWE-369CWE-190

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
libpng16sisyphus1.6.35-alt11.6.42-alt2ALT-PU-2018-2451-1214397Fixed
libpng16p101.6.35-alt11.6.37-alt1ALT-PU-2018-2451-1214397Fixed
libpng16p91.6.35-alt11.6.36-alt1ALT-PU-2018-2451-1214397Fixed
libpng16c10f11.6.35-alt11.6.37-alt1ALT-PU-2018-2451-1214397Fixed
libpng16c9f21.6.35-alt11.6.36-alt1ALT-PU-2018-2451-1214397Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://sourceforge.net/p/libpng/bugs/278/
  • Third Party Advisory
https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
  • Patch
  • Third Party Advisory
USN-3712-1
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
  • Patch
  • Vendor Advisory
1041889
  • Broken Link
  • Third Party Advisory
  • VDB Entry
105599
  • Broken Link
  • Third Party Advisory
  • VDB Entry
https://security.netapp.com/advisory/ntap-20181018-0001/
  • Third Party Advisory
RHSA-2018:3008
  • Third Party Advisory
RHSA-2018:3007
  • Third Party Advisory
RHSA-2018:3003
  • Third Party Advisory
RHSA-2018:3002
  • Third Party Advisory
RHSA-2018:3001
  • Third Party Advisory
RHSA-2018:3000
  • Third Party Advisory
RHSA-2018:3534
  • Third Party Advisory
RHSA-2018:3533
  • Third Party Advisory
RHSA-2018:3672
  • Third Party Advisory
RHSA-2018:3671
  • Third Party Advisory
RHSA-2018:3779
  • Third Party Advisory
RHSA-2018:3852
  • Third Party Advisory
GLSA-201908-10
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:libpng:libpng:1.6.34:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      Configuration 3

      cpe:2.3:a:oracle:jdk:11.0.0:*:*:*:*:*:*:*

      cpe:2.3:a:oracle:jre:11.0.0:*:*:*:*:*:*:*

      cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*

      cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*

      cpe:2.3:a:oracle:jdk:1.6.0:update201:*:*:*:*:*:*

      cpe:2.3:a:oracle:jre:1.6.0:update201:*:*:*:*:*:*

      cpe:2.3:a:oracle:jre:1.7.0:update191:*:*:*:*:*:*

      cpe:2.3:a:oracle:jre:1.8.0:update181:*:*:*:*:*:*

      Configuration 4

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*