ID

VAR-200611-0210


CVE

CVE-2006-5793


TITLE

libpng' Graphics Library PNG_SET_SPLT Remote Denial of Service Attack Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200611-295

DESCRIPTION

The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read. The 'libpng' graphics library is reported prone to a denial-of-service vulnerability. The library fails to perform proper bounds-checking of user-supplied input, which leads to an out-of-bounds read error. Attackers may exploit this vulnerability to crash an application that relies on the affected library. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: libpng: Denial of Service Date: November 17, 2006 Bugs: #154380 ID: 200611-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in libpng may allow a remote attacker to crash applications that handle untrusted images. Background ========== libpng is a free ANSI C library used to process and manipulate PNG images. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/libpng < 1.2.13 >= 1.2.13 Description =========== Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that a vulnerability exists in the sPLT chunk handling code of libpng, a large sPLT chunk may cause an application to attempt to read out of bounds. Impact ====== A remote attacker could craft an image that when processed or viewed by an application using libpng causes the application to terminate abnormally. Workaround ========== There is no known workaround at this time. Resolution ========== All libpng users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.13" References ========== [ 1 ] CVE-2006-5793 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200611-09.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: FUJITSU Interstage Products Apache Tomcat Security Bypass SECUNIA ADVISORY ID: SA32234 VERIFY ADVISORY: http://secunia.com/advisories/32234/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Interstage Application Server 6.x http://secunia.com/advisories/product/13693/ Interstage Application Server 7.x http://secunia.com/advisories/product/13692/ Interstage Application Server 8.x http://secunia.com/advisories/product/13685/ Interstage Application Server 9.x http://secunia.com/advisories/product/15986/ Interstage Apworks 6.x http://secunia.com/advisories/product/13688/ Interstage Apworks 7.x http://secunia.com/advisories/product/13689/ Interstage Studio 8.x http://secunia.com/advisories/product/13690/ Interstage Studio 9.x http://secunia.com/advisories/product/15610/ Interstage Business Application Server 8.x http://secunia.com/advisories/product/13687/ Interstage Job Workload Server 8.x http://secunia.com/advisories/product/13686/ DESCRIPTION: A security issue has been reported in various FUJITSU Interstage products, which potentially can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to a synchronisation problem when checking IP addresses and can be exploited to bypass a filter valve that extends "RemoteFilterValve" and potentially gain access to protected contexts. SOLUTION: Patches are scheduled for release. Use a proxy or firewall to protect resources. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: FUJITSU: http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html JVN: http://jvn.jp/en/jp/JVN30732239/index.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2006:212 http://www.mandriva.com/security/ _______________________________________________________________________ Package : doxygen Date : November 16, 2006 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0 _______________________________________________________________________ Problem Description: Doxygen is a documentation system for C, C++ and IDL. (CVE-2006-3334) It is questionable whether this issue is actually exploitable, but the patch to correct the issue has been included in versions < 1.2.12. (CVE-2006-5793) In addition, an patch to address several old vulnerabilities has been applied to this build. (CAN-2002-1363, CAN-2004-0421, CAN-2004-0597, CAN-2004-0598, CAN-2004-0599) Packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793 _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: f85fd4b73ca06136e4346df073851e5f 2006.0/i586/doxygen-1.4.4-1.1.20060mdk.i586.rpm 0842c1496bbb02b79d5cef3386b19380 2006.0/SRPMS/doxygen-1.4.4-1.1.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: fc3e569bd8ad2aa9aea76a6f4246cfec 2006.0/x86_64/doxygen-1.4.4-1.1.20060mdk.x86_64.rpm 0842c1496bbb02b79d5cef3386b19380 2006.0/SRPMS/doxygen-1.4.4-1.1.20060mdk.src.rpm Mandriva Linux 2007.0: 9d0af28627560057e6c80e64bbacf030 2007.0/i586/doxygen-1.4.7-1.1mdv2007.0.i586.rpm f673aab0185f79a8aa048f69b06807bf 2007.0/SRPMS/doxygen-1.4.7-1.1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: 7fca6ebbe6f07e51de7fd771678277b4 2007.0/x86_64/doxygen-1.4.7-1.1mdv2007.0.x86_64.rpm f673aab0185f79a8aa048f69b06807bf 2007.0/SRPMS/doxygen-1.4.7-1.1mdv2007.0.src.rpm Corporate 3.0: 9452cede2d92671808eebe1adfc395ef corporate/3.0/i586/doxygen-1.3.5-2.1.C30mdk.i586.rpm 9e84b6e12b77f43d123888b7ae05e5f4 corporate/3.0/SRPMS/doxygen-1.3.5-2.1.C30mdk.src.rpm Corporate 3.0/X86_64: d988dc94c39515b3855116709bcc84de corporate/3.0/x86_64/doxygen-1.3.5-2.1.C30mdk.x86_64.rpm 9e84b6e12b77f43d123888b7ae05e5f4 corporate/3.0/SRPMS/doxygen-1.3.5-2.1.C30mdk.src.rpm Corporate 4.0: a3b4702c81d1739249d59782efb316dc corporate/4.0/i586/doxygen-1.4.4-1.1.20060mlcs4.i586.rpm 8223a356c6cf8a790dd20b3d70533f19 corporate/4.0/SRPMS/doxygen-1.4.4-1.1.20060mlcs4.src.rpm Corporate 4.0/X86_64: 0568b10460c651f18fd3e2a8e76b4300 corporate/4.0/x86_64/doxygen-1.4.4-1.1.20060mlcs4.x86_64.rpm 8223a356c6cf8a790dd20b3d70533f19 corporate/4.0/SRPMS/doxygen-1.4.4-1.1.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFFXMIpmqjQ0CJFipgRAnt1AJ9NuzEsIC9PzHE278eZAhOPHjMh8QCePD/Q pK8OJ2vhx3DqZ400EPH5QMw= =R8Jo -----END PGP SIGNATURE----- . The bug is in the decoder for the sPLT ("suggested palette") chunk and can lead to crashes and, accordingly, a DoS, when an application using libpng for PNG processing displays a specially crafted PNG image. The Common Vulnerabilities and Exposures (CVE) project assigned the id CVE-2006-5793 [2] to the problem. ________________________________________________________________________ References: [0] http://www.libpng.org/pub/png/ [1] http://www.libpng.org/pub/png/libpng.html [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793 ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG <openpkg@openpkg.org>" (ID 63C4CB9F) which you can retrieve from http://openpkg.org/openpkg.org.pgp. Follow the instructions on http://openpkg.org/security/signatures/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG <openpkg@openpkg.org> iD8DBQFFXXaWgHWT4GPEy58RAhKOAJwMnHAAuITUWPEiMFaGMiBK9DattACeKq+J T9O+2CcdG0iwbDjXV1/Sl40= =6FRk -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2006-5793 // BID: 21078 // PACKETSTORM: 52280 // PACKETSTORM: 52283 // PACKETSTORM: 52284 // PACKETSTORM: 70792 // PACKETSTORM: 52286 // PACKETSTORM: 52295 // PACKETSTORM: 52285

AFFECTED PRODUCTS

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.7rc1

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.5

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.7

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.3

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.8

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.6

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.12

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.11

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.9

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.10

Trust: 1.6

vendor:greg roelofsmodel:libpngscope:eqversion:1.0.9

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.2

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.0.8

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.0.6

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.4

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.0.7

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.0

Trust: 1.0

vendor:greg roelofsmodel:libpngscope:eqversion:1.2.1

Trust: 1.0

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:redhatmodel:enterprise linux virtualization serverscope:eqversion:5

Trust: 0.3

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:libpngmodel:libpng3scope:eqversion:1.2.12

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:libpngmodel:libpng3scope:eqversion:1.2.11

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.3

vendor:googlemodel:android software development kit m3-rc37ascope: - version: -

Trust: 0.3

vendor:avayamodel:ccsscope:eqversion:3.0

Trust: 0.3

vendor:libpngmodel:libpngscope:eqversion:1.0.18

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:ccsscope:eqversion:3.1.1

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:openpkgmodel:stablescope: - version: -

Trust: 0.3

vendor:libpngmodel:libpng3scope:eqversion:1.2.10

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:trustixmodel:operating system enterprise serverscope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:googlemodel:android software development kit m5-rc15scope:neversion: -

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux hardware certificationscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:2.0

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:ccsscope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:openpkgmodel:e1.0-solidscope: - version: -

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:fujiscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:redmodel:hat fedora core6scope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:avayamodel:messaging storage server mssscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:avayamodel:sesscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:avayamodel:sesscope:eqversion:3.1.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.3

vendor:avayamodel:message networking mnscope:eqversion:3.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:3.1.3

Trust: 0.3

vendor:transsoftmodel:broker ftp serverscope:eqversion:8.0

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:2.0

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:redmodel:hat fedora core5scope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:openpkgmodel:2-stable-20061018scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop multi os clientscope:eqversion:5

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:sesscope:eqversion:2.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0.0x64

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:2.0.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:enterprise linux optional productivity application serverscope:eqversion:5

Trust: 0.3

sources: BID: 21078 // CNNVD: CNNVD-200611-295 // NVD: CVE-2006-5793

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5793
value: LOW

Trust: 1.0

CNNVD: CNNVD-200611-295
value: LOW

Trust: 0.6

nvd@nist.gov: CVE-2006-5793
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

sources: CNNVD: CNNVD-200611-295 // NVD: CVE-2006-5793

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2006-5793

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200611-295

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200611-295

EXTERNAL IDS

db:NVDid:CVE-2006-5793

Trust: 2.5

db:BIDid:21078

Trust: 1.9

db:SECUNIAid:22950

Trust: 1.6

db:SECUNIAid:22900

Trust: 1.6

db:SECUNIAid:22956

Trust: 1.6

db:SECUNIAid:23208

Trust: 1.6

db:SECUNIAid:25329

Trust: 1.6

db:SECUNIAid:22889

Trust: 1.6

db:SECUNIAid:23335

Trust: 1.6

db:SECUNIAid:22951

Trust: 1.6

db:SECUNIAid:25742

Trust: 1.6

db:SECUNIAid:29420

Trust: 1.6

db:SECUNIAid:22958

Trust: 1.6

db:SECUNIAid:22941

Trust: 1.6

db:SECTRACKid:1017244

Trust: 1.6

db:VUPENid:ADV-2006-4521

Trust: 1.6

db:VUPENid:ADV-2008-0924

Trust: 1.6

db:VUPENid:ADV-2006-4568

Trust: 1.6

db:MANDRIVAid:MDKSA-2006:212

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:211

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:210

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:209

Trust: 0.6

db:BUGTRAQid:20080304 CORE-2008-0124: MULTIPLE VULNERABILITIES IN GOOGLE'S ANDROID SDK

Trust: 0.6

db:BUGTRAQid:20061204 RPSA-2006-0211-2 DOXYGEN LIBPNG

Trust: 0.6

db:BUGTRAQid:20061115 RPSA-2006-0211-1 LIBPNG

Trust: 0.6

db:OPENPKGid:OPENPKG-SA-2006.036

Trust: 0.6

db:UBUNTUid:USN-383-1

Trust: 0.6

db:XFid:30290

Trust: 0.6

db:SUSEid:SUSE-SR:2006:028

Trust: 0.6

db:TRUSTIXid:2006-0065

Trust: 0.6

db:REDHATid:RHSA-2007:0356

Trust: 0.6

db:APPLEid:APPLE-SA-2008-03-18

Trust: 0.6

db:GENTOOid:GLSA-200611-09

Trust: 0.6

db:SLACKWAREid:SSA:2006-335-03

Trust: 0.6

db:CNNVDid:CNNVD-200611-295

Trust: 0.6

db:SECUNIAid:32234

Trust: 0.2

db:PACKETSTORMid:52280

Trust: 0.1

db:PACKETSTORMid:52283

Trust: 0.1

db:PACKETSTORMid:52284

Trust: 0.1

db:JVNid:JVN30732239

Trust: 0.1

db:PACKETSTORMid:70792

Trust: 0.1

db:PACKETSTORMid:52286

Trust: 0.1

db:PACKETSTORMid:52295

Trust: 0.1

db:PACKETSTORMid:52285

Trust: 0.1

sources: BID: 21078 // PACKETSTORM: 52280 // PACKETSTORM: 52283 // PACKETSTORM: 52284 // PACKETSTORM: 70792 // PACKETSTORM: 52286 // PACKETSTORM: 52295 // PACKETSTORM: 52285 // CNNVD: CNNVD-200611-295 // NVD: CVE-2006-5793

REFERENCES

url:http://bugs.gentoo.org/show_bug.cgi?id=154380

Trust: 1.9

url:http://support.avaya.com/elmodocs2/security/asa-2007-254.htm

Trust: 1.9

url:https://issues.rpath.com/browse/rpl-790

Trust: 1.9

url:http://security.gentoo.org/glsa/glsa-200611-09.xml

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-383-1

Trust: 1.6

url:http://sourceforge.net/project/shownotes.php?release_id=464278

Trust: 1.6

url:http://secunia.com/advisories/22958

Trust: 1.6

url:http://secunia.com/advisories/22956

Trust: 1.6

url:http://secunia.com/advisories/22900

Trust: 1.6

url:http://secunia.com/advisories/22889

Trust: 1.6

url:http://bugs.gentoo.org/attachment.cgi?id=101400&action=view

Trust: 1.6

url:http://www.trustix.org/errata/2006/0065/

Trust: 1.6

url:http://www.securityfocus.com/bid/21078

Trust: 1.6

url:http://securitytracker.com/id?1017244

Trust: 1.6

url:http://secunia.com/advisories/22951

Trust: 1.6

url:http://secunia.com/advisories/22950

Trust: 1.6

url:http://secunia.com/advisories/22941

Trust: 1.6

url:https://issues.rpath.com/browse/rpl-824

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2007-0356.html

Trust: 1.6

url:http://www.openpkg.com/security/advisories/openpkg-sa-2006.036.html

Trust: 1.6

url:http://www.novell.com/linux/security/advisories/2006_28_sr.html

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:212

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:211

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:210

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:209

Trust: 1.6

url:http://www.coresecurity.com/?action=item&id=2148

Trust: 1.6

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.465035

Trust: 1.6

url:http://secunia.com/advisories/29420

Trust: 1.6

url:http://secunia.com/advisories/25742

Trust: 1.6

url:http://secunia.com/advisories/25329

Trust: 1.6

url:http://secunia.com/advisories/23335

Trust: 1.6

url:http://secunia.com/advisories/23208

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2008/mar/msg00001.html

Trust: 1.6

url:http://docs.info.apple.com/article.html?artnum=307562

Trust: 1.6

url:http://www.securityfocus.com/archive/1/453484/100/100/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4568

Trust: 1.0

url:http://www.securityfocus.com/archive/1/489135/100/0/threaded

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10324

Trust: 1.0

url:http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4521

Trust: 1.0

url:http://www.vupen.com/english/advisories/2008/0924/references

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30290

Trust: 1.0

url:http://www.securityfocus.com/archive/1/451874/100/200/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5793

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:212

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:211

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:210

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:209

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/30290

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4568

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4521

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/489135/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/453484/100/100/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/451874/100/200/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0924/references

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2006-5793

Trust: 0.5

url:http://www.libpng.org/pub/png/libpng.html

Trust: 0.4

url:http://www.mandriva.com/security/

Trust: 0.4

url:http://www.mandriva.com/security/advisories

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2006-3334

Trust: 0.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3334

Trust: 0.4

url:http://rhn.redhat.com/errata/rhsa-2007-0356.html

Trust: 0.3

url:http://bugs.gentoo.org.

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://secunia.com/advisories/32234/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/product/13693/

Trust: 0.1

url:http://secunia.com/advisories/product/15986/

Trust: 0.1

url:http://jvn.jp/en/jp/jvn30732239/index.html

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/13690/

Trust: 0.1

url:http://secunia.com/advisories/product/13688/

Trust: 0.1

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html

Trust: 0.1

url:http://secunia.com/advisories/product/15610/

Trust: 0.1

url:http://secunia.com/advisories/product/13685/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/product/13687/

Trust: 0.1

url:http://secunia.com/advisories/product/13689/

Trust: 0.1

url:http://secunia.com/advisories/product/13686/

Trust: 0.1

url:http://secunia.com/advisories/product/13692/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0599

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2002-1363

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0421

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0598

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0597

Trust: 0.1

url:http://www.libpng.org/pub/png/

Trust: 0.1

url:http://openpkg.org/security/

Trust: 0.1

url:http://openpkg.org/openpkg.org.pgp.

Trust: 0.1

url:http://openpkg.org/security/signatures/

Trust: 0.1

url:http://openpkg.com

Trust: 0.1

sources: BID: 21078 // PACKETSTORM: 52280 // PACKETSTORM: 52283 // PACKETSTORM: 52284 // PACKETSTORM: 70792 // PACKETSTORM: 52286 // PACKETSTORM: 52295 // PACKETSTORM: 52285 // CNNVD: CNNVD-200611-295 // NVD: CVE-2006-5793

CREDITS

Tavis Ormandy from the Gentoo Linux Security Auditing Team discovered this vulnerability.

Trust: 0.9

sources: BID: 21078 // CNNVD: CNNVD-200611-295

SOURCES

db:BIDid:21078
db:PACKETSTORMid:52280
db:PACKETSTORMid:52283
db:PACKETSTORMid:52284
db:PACKETSTORMid:70792
db:PACKETSTORMid:52286
db:PACKETSTORMid:52295
db:PACKETSTORMid:52285
db:CNNVDid:CNNVD-200611-295
db:NVDid:CVE-2006-5793

LAST UPDATE DATE

2026-04-18T20:16:28.473000+00:00


SOURCES UPDATE DATE

db:BIDid:21078date:2008-03-19T02:30:00
db:CNNVDid:CNNVD-200611-295date:2006-11-30T00:00:00
db:NVDid:CVE-2006-5793date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:21078date:2006-11-14T00:00:00
db:PACKETSTORMid:52280date:2006-11-18T01:00:18
db:PACKETSTORMid:52283date:2006-11-18T01:41:02
db:PACKETSTORMid:52284date:2006-11-18T01:43:05
db:PACKETSTORMid:70792date:2008-10-10T23:03:15
db:PACKETSTORMid:52286date:2006-11-18T01:44:10
db:PACKETSTORMid:52295date:2006-11-19T01:46:25
db:PACKETSTORMid:52285date:2006-11-18T01:43:39
db:CNNVDid:CNNVD-200611-295date:2006-11-17T00:00:00
db:NVDid:CVE-2006-5793date:2006-11-17T23:07:00