CVE-2016-5735

Published: 23 May 2017

Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
pngquant
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.5.0-2)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.5.0-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.5.0-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.5.0-2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)