CVE-2016-5735

NameCVE-2016-5735
DescriptionInteger overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-966-1
NVD severitymedium (attack range: remote)
Debian Bugs863469

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pngquant (PTS)jessie2.3.0-1vulnerable
stretch2.5.0-2fixed
buster, bullseye, sid2.12.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pngquantsource(unstable)2.5.0-2medium863469
pngquantsourcewheezy1.0-4.1+deb7u1mediumDLA-966-1

Notes

[jessie] - pngquant <no-dsa> (Minor issue)
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285

Search for package or bug name: Reporting problems