CVE-2020-28248

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28248
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28248.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-28248
Aliases
Published
2021-02-20T00:15:12Z
Modified
2025-10-15T12:15:56.866433Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.

References

Affected packages

Git / github.com/gemini-testing/png-img

Affected ranges

Type
GIT
Repo
https://github.com/gemini-testing/png-img
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.1
v0.2.0
v0.2.1
v0.3.0
v0.4.0
v0.4.1

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.2.0
v2.3.0

v3.*

v3.0.0

Database specific

vanir_signatures

[
    {
        "digest": {
            "length": 253.0,
            "function_hash": "247540405358534864148916063282642105731"
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2020-28248-0a0dfe46",
        "source": "https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d",
        "target": {
            "function": "PngImg::InitStorage_",
            "file": "src/PngImg.cc"
        }
    },
    {
        "digest": {
            "line_hashes": [
                "236923606706807126852737180229274119136",
                "239734977927648997720820885809752257972",
                "289798947922595080307175432979138576455",
                "238842229380349258414681969259940006383",
                "3128312757959955466674962830250232240",
                "305968787605953264195244417358628798401"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2020-28248-e7d4e48e",
        "source": "https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d",
        "target": {
            "file": "src/PngImg.cc"
        }
    }
]