CVE-2018-13785

Publication date 9 July 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
libpng 18.04 LTS bionic Not in release
17.10 artful Not in release
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected
libpng1.6 18.04 LTS bionic
Fixed 1.6.34-1ubuntu0.18.04.1
17.10 artful
Fixed 1.6.34-1ubuntu0.17.10.1
16.04 LTS xenial
Not affected
14.04 LTS trusty Not in release

Notes


leosilva

could not reproduce with xenial version also xenial version hasn't the code affected. From the comments, it was tested in a xenial release, but bug was found using a different version from git/upstream.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libpng1.6

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

Other references