Integer overflow in the rwpngreadimage24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
[
{
"signature_version": "v1",
"source": "https://github.com/kornelski/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285",
"digest": {
"threshold": 0.9,
"line_hashes": [
"11749072273354818079652599568515810704",
"295321760208783322335535339872887592277",
"263241181405925274193218127026934768670",
"279570523230507015572632992992007345031",
"61102045982274863775149249678886770771",
"101195728603932320435831620322596778343",
"185264035726705698568741517661172567482",
"323461216799807688237550986647038251466",
"59479731129094185246169890485511112403",
"3248771318875236472868746566677569443"
]
},
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "rwpng.c"
},
"id": "CVE-2016-5735-90d441ae"
},
{
"signature_version": "v1",
"source": "https://github.com/kornelski/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285",
"digest": {
"length": 4485.0,
"function_hash": "219203256382287797673606922366190072575"
},
"signature_type": "Function",
"deprecated": false,
"target": {
"function": "rwpng_read_image24_libpng",
"file": "rwpng.c"
},
"id": "CVE-2016-5735-9ffba8c0"
}
]