CVE-2010-2249

6.5 MEDIUM
Published: June 30, 2010 Modified: April 29, 2026
View on NVD

Description

Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2010/000105.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://secunia.com/advisories/40302
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/40336
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/40472
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/40547
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/41574
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/42314
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/42317
Source: secalert@redhat.com
Broken Link
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061
Source: secalert@redhat.com
Mailing List Patch Third Party Advisory
http://support.apple.com/kb/HT4435
Source: secalert@redhat.com
Broken Link
http://support.apple.com/kb/HT4456
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT4457
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT4554
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT4566
Source: secalert@redhat.com
Broken Link
http://www.debian.org/security/2010/dsa-2072
Source: secalert@redhat.com
Third Party Advisory
http://www.libpng.org/pub/png/libpng.html
Source: secalert@redhat.com
Product Vendor Advisory
http://www.securityfocus.com/bid/41174
Source: secalert@redhat.com
Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024723
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-960-1
Source: secalert@redhat.com
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0014.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2010/1612
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/1637
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/1755
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/1837
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/1846
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/1877
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/2491
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/3045
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2010/3046
Source: secalert@redhat.com
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=608644
Source: secalert@redhat.com
Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59816
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2010/000105.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/40302
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/40336
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/40472
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/40547
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/41574
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/42314
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/42317
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://support.apple.com/kb/HT4435
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.apple.com/kb/HT4456
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4457
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4554
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT4566
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2010/dsa-2072
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.libpng.org/pub/png/libpng.html
Source: af854a3a-2127-422b-91ae-364da2661108
Product Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:133
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/41174
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024723
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-960-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2010-0014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2010/1612
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1637
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1755
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1837
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1846
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/1877
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/2491
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/3045
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2010/3046
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=608644
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59816
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

80 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
1.6%
82th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject libpng apple suse vmware debian canonical opensuse