libpng up to 1.6.9 IDAT Chunk pngpread.c png_push_read_chunk Zero Length numeric error
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in libpng up to 1.6.9. It has been declared as problematic. This vulnerability affects the function png_push_read_chunk
of the file pngpread.c of the component IDAT Chunk Handler. The manipulation as part of Zero Length leads to numeric error.
This vulnerability was named CVE-2014-0333. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Details
A vulnerability was found in libpng up to 1.6.9 (Image Processing Software). It has been classified as problematic. This affects the function png_push_read_chunk
of the file pngpread.c of the component IDAT Chunk Handler. The manipulation as part of a Zero Length leads to a numeric error vulnerability. CWE is classifying the issue as CWE-189. This is going to have an impact on availability. The summary by CVE is:
The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
The weakness was disclosed 02/09/2014 by Glenn Randers-Pehrson as VU#684412 as confirmed advisory (CERT.org). It is possible to read the advisory at kb.cert.org. This vulnerability is uniquely identified as CVE-2014-0333 since 12/05/2013. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known.
After immediately, there has been an exploit disclosed. The exploit is shared for download at kb.cert.org. It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 75285 (openSUSE Security Update : libpng16 (openSUSE-SU-2014:0358-1)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family SuSE Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 122327 (VLC Media Player GnuTLS "read_server_hello()" Memory Corruption Vulnerability).
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at X-Force (91579), Tenable (75285), SecurityFocus (BID 65776†), Secunia (SA57077†) and Vulnerability Center (SBV-43741†). Further details are available at sourceforge.net. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 75285
Nessus Name: openSUSE Security Update : libpng16 (openSUSE-SU-2014:0358-1)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 867646
OpenVAS Name: Fedora Update for mingw-libpng FEDORA-2014-4564
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
12/05/2013 🔍02/09/2014 🔍
02/09/2014 🔍
02/09/2014 🔍
02/25/2014 🔍
02/26/2014 🔍
02/27/2014 🔍
03/10/2014 🔍
03/25/2014 🔍
06/13/2014 🔍
04/12/2025 🔍
Sources
Advisory: VU#684412Researcher: Glenn Randers-Pehrson
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-0333 (🔍)
GCVE (CVE): GCVE-0-2014-0333
GCVE (VulDB): GCVE-100-12507
CERT: 🔍
X-Force: 91579 - libpng png_push_read_chunk denial of service, Medium Risk
SecurityFocus: 65776 - libpng CVE-2014-0333 Infinite Loop Denial of Service Vulnerability
Secunia: 57077 - libpng "IDAT" Parsing Infinite Loop Denial of Service Vulnerability, Less Critical
Vulnerability Center: 43741 - libpng 1.6 - 1.6.9 Remote DoS Vulnerability in Progressive Decoder via IDAT Chunk, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 03/10/2014 09:23 AMUpdated: 04/12/2025 07:48 PM
Changes: 03/10/2014 09:23 AM (86), 05/24/2017 09:16 AM (3), 06/15/2021 09:53 AM (3), 08/18/2024 08:08 PM (15), 04/12/2025 07:48 PM (1)
Complete: 🔍
Cache ID: 18:7FE:40
No comments yet. Languages: en.
Please log in to comment.