CVE-2007-2445

N/A Unknown
Published: May 16, 2007 Modified: April 23, 2026
View on NVD

Description

The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/36196
Source: secalert@redhat.com
http://secunia.com/advisories/25268
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25273
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25292
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25329
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/25353
Source: secalert@redhat.com
http://secunia.com/advisories/25461
Source: secalert@redhat.com
http://secunia.com/advisories/25554
Source: secalert@redhat.com
http://secunia.com/advisories/25571
Source: secalert@redhat.com
http://secunia.com/advisories/25742
Source: secalert@redhat.com
http://secunia.com/advisories/25787
Source: secalert@redhat.com
http://secunia.com/advisories/25867
Source: secalert@redhat.com
http://secunia.com/advisories/27056
Source: secalert@redhat.com
http://secunia.com/advisories/29420
Source: secalert@redhat.com
http://secunia.com/advisories/30161
Source: secalert@redhat.com
http://secunia.com/advisories/31168
Source: secalert@redhat.com
http://secunia.com/advisories/34388
Source: secalert@redhat.com
http://www.kb.cert.org/vuls/id/684664
Source: secalert@redhat.com
Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/24000
Source: secalert@redhat.com
http://www.securityfocus.com/bid/24023
Source: secalert@redhat.com
http://www.trustix.org/errata/2007/0019/
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-472-1
Source: secalert@redhat.com
https://issues.rpath.com/browse/RPL-1381
Source: secalert@redhat.com
http://docs.info.apple.com/article.html?artnum=307562
Source: af854a3a-2127-422b-91ae-364da2661108
http://irrlicht.sourceforge.net/changes.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://openpkg.com/go/OpenPKG-SA-2007.013
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/36196
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25268
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25273
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25292
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25329
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/25353
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25461
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25554
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25571
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25742
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25787
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25867
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27056
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29420
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30161
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31168
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34388
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.coresecurity.com/?action=item&id=2148
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1613
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1750
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/684664
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2007_13_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0356.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/468910/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/489135/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24000
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24023
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018078
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2007/0019/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-472-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1838
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2385
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0924/references
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-1381
Source: af854a3a-2127-422b-91ae-364da2661108

102 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
38.3%
97th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

png_reference_library linux