Integer overflow in the rwpngreadimage24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Line", "source": "https://github.com/kornelski/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285", "signature_version": "v1", "target": { "file": "rwpng.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "11749072273354818079652599568515810704", "295321760208783322335535339872887592277", "263241181405925274193218127026934768670", "279570523230507015572632992992007345031", "61102045982274863775149249678886770771", "101195728603932320435831620322596778343", "185264035726705698568741517661172567482", "323461216799807688237550986647038251466", "59479731129094185246169890485511112403", "3248771318875236472868746566677569443" ] }, "id": "CVE-2016-5735-90d441ae" }, { "deprecated": false, "signature_type": "Function", "source": "https://github.com/kornelski/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285", "signature_version": "v1", "target": { "file": "rwpng.c", "function": "rwpng_read_image24_libpng" }, "digest": { "function_hash": "219203256382287797673606922366190072575", "length": 4485.0 }, "id": "CVE-2016-5735-9ffba8c0" } ] }