CVE-2010-0205 (CNNVD-201003-024)
中文标题:
Libpng png_decompress_chunk()函数拒绝服务漏洞
英文标题:
The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, ...
漏洞描述
中文描述:
libpng是一个可对PNG图形文件实现创建、读写等操作的PNG参考库。 libpng库的png_decompress_chunk()函数在处理包含有高压缩比的辅助数据块的PNG文件时可能会消耗大量的CPU时间和内存,这种资源耗尽可能导致使用libpng库的应用挂起。 PNG格式使用高效的压缩方式来存储图形数据和辅助数据库中的一些相关数据。PNG规范没有限制块的数量,将其大小限制于2.147G(2,147,483,647字节)。类似的,规范将图形的宽度和高度限制到21亿4700万行和21亿4700万列。 由于deflate压缩方式可以非常高效的压缩仅由多次重复的单字节组成的数据流,很小的PNG文件在解压时可能会占用很大的内存,形成耗尽所有可用内存的"解压炸弹"。例如,对于包含有50,000行且每行都包含有100个字母Z的zTXt块,压缩后大约为17k字节,但解压后为5M,压缩比约为300:1。 Libpng库在展开压缩的zTXt、iTXt和iCCP辅助数据块时使用了低效率的内存获取方式,图形文件中所包含的大约为50k畸形iCCP块可以解压到60M,这会将浏览器挂起约20分钟,精心创建的恶意块还可能将浏览器挂起更长时间,耗尽所有可用的内存。
英文描述:
The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| libpng | libpng | * | - | - |
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 11 | - | - |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 12 | - | - |
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 13 | - | - |
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.0 | - | - |
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.1 | - | - |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
|
| opensuse | opensuse | 11.2 | - | - |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 9 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 10 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*
|
| suse | linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 6.06 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 8.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 6.0 | - | - |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:N/I:N/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2010-0205 |
2025-11-11 15:18:14 | 2025-11-11 07:33:06 |
| NVD | nvd_CVE-2010-0205 |
2025-11-11 14:53:24 | 2025-11-11 07:41:53 |
| CNNVD | cnnvd_CNNVD-201003-024 |
2025-11-11 15:09:08 | 2025-11-11 07:49:41 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201003-024
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:N/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 18
- data_sources: ['cve'] -> ['cve', 'nvd']