CVE-2015-8540
Publication date 11 December 2015
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
14.04 LTS trusty | Not in release | |
firefox | ||
14.04 LTS trusty | Not in release | |
libpng | ||
14.04 LTS trusty |
Fixed 1.2.50-1ubuntu2.14.04.2
|
|
thunderbird | ||
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
libpng |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-2861-1
- libpng vulnerabilities
- 6 January 2016