{"id":"CVE-2015-8472","details":"Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.","modified":"2026-04-16T06:19:15.011536070Z","published":"2016-01-21T15:59:00Z","related":["SUSE-SU-2016:0265-1","SUSE-SU-2016:0269-1","SUSE-SU-2016:0390-1","SUSE-SU-2016:0399-1","SUSE-SU-2016:0401-1","SUSE-SU-2016:0428-1","SUSE-SU-2016:0431-1","SUSE-SU-2016:0433-1","SUSE-SU-2016:0636-1","SUSE-SU-2016:0770-1","openSUSE-SU-2024:10534-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2594.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2595.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2596.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0055.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0056.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0057.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3443"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"type":"ADVISORY","url":"https://support.apple.com/HT206167"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"type":"WEB","url":"http://sourceforge.net/projects/libpng/files/libpng10/1.0.65/"},{"type":"WEB","url":"http://sourceforge.net/projects/libpng/files/libpng12/1.2.55/"},{"type":"WEB","url":"http://sourceforge.net/projects/libpng/files/libpng14/1.4.18/"},{"type":"WEB","url":"http://sourceforge.net/projects/libpng/files/libpng15/1.5.25/"},{"type":"WEB","url":"http://sourceforge.net/projects/libpng/files/libpng16/1.6.20/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2015/12/03/6"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/78624"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10148"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}