CVE-2008-3964

N/A Unknown
Published: September 11, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31781
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/33137
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35302
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35386
Source: cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-15.xml
Source: cve@mitre.org
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
Source: cve@mitre.org
Third Party Advisory
http://www.kb.cert.org/vuls/id/889484
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.openwall.com/lists/oss-security/2008/09/09/3
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/09/8
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/31049
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2512
Source: cve@mitre.org
Permissions Required
http://www.vupen.com/english/advisories/2009/1462
Source: cve@mitre.org
Permissions Required
http://www.vupen.com/english/advisories/2009/1560
Source: cve@mitre.org
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/44928
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://secunia.com/advisories/31781
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/33137
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35302
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35386
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200812-15.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517
Source: af854a3a-2127-422b-91ae-364da2661108
Product Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=624518
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/889484
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openwall.com/lists/oss-security/2008/09/09/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2008/09/09/8
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.securityfocus.com/bid/31049
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/2512
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2009/1462
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.vupen.com/english/advisories/2009/1560
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/44928
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
82th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

libpng