{"id":"CVE-2014-9495","details":"Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a \"very wide interlaced\" PNG image.","modified":"2026-04-16T06:21:25.916357452Z","published":"2015-01-10T19:59:00Z","related":["openSUSE-SU-2024:10184-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/62725"},{"type":"ADVISORY","url":"https://support.apple.com/HT206167"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"},{"type":"WEB","url":"http://sourceforge.net/p/png-mng/mailman/message/33172831/"},{"type":"WEB","url":"http://sourceforge.net/p/png-mng/mailman/message/33173461/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/01/04/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/01/10/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/01/10/3"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/71820"},{"type":"WEB","url":"http://www.securitytracker.com/id/1031444"}],"schema_version":"1.7.5"}