CVE-2019-7317 (CNNVD-201902-012)
MEDIUM
中文标题:
libpng 资源管理错误漏洞
英文标题:
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_fu...
CVSS分数:
5.3
发布时间:
2019-02-04 07:00:00
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
libpng是一个可对PNG图形文件实现创建、读写等操作的PNG参考库。 libpng 1.6.37之前的1.6.x版本中的png.c文件的‘png_image_free’函数存在资源管理错误漏洞。攻击者可借助特制的文件利用该漏洞造成拒绝服务。
英文描述:
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| libpng | libpng | * | - | - |
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 18.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 19.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
|
| oracle | hyperion_infrastructure_technology | 11.2.6.0 | - | - |
cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
|
| oracle | java_se | 7u221 | - | - |
cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
|
| oracle | java_se | 8u212 | - | - |
cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
|
| oracle | jdk | 11.0.3 | - | - |
cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
|
| oracle | jdk | 12.0.1 | - | - |
cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
|
| oracle | mysql | * | - | - |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
| hp | xp7_command_view | * | - | - |
cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
|
| hpe | xp7_command_view_advanced_edition_suite | * | - | - |
cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
|
| mozilla | firefox | - | - | - |
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
|
| mozilla | thunderbird | - | - | - |
cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
|
| opensuse | leap | 15.0 | - | - |
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| opensuse | leap | 42.3 | - | - |
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
|
| opensuse | package_hub | - | - | - |
cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | * | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
|
| netapp | active_iq_unified_manager | 9.6 | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
|
| netapp | cloud_backup | - | - | - |
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
|
| netapp | e-series_santricity_management | - | - | - |
cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
|
| netapp | e-series_santricity_storage_manager | * | - | - |
cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
|
| netapp | e-series_santricity_unified_manager | * | - | - |
cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
|
| netapp | e-series_santricity_web_services | * | - | - |
cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
|
| netapp | oncommand_insight | * | - | - |
cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
|
| netapp | oncommand_workflow_automation | * | - | - |
cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
|
| netapp | plug-in_for_symantec_netbackup | - | - | - |
cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
|
| netapp | snapmanager | * | - | - |
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
|
| netapp | snapmanager | 3.4.2 | - | - |
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
|
| netapp | steelstore | - | - | - |
cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
|
| redhat | satellite | 5.8 | - | - |
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_ibm_z_systems | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_big_endian | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_little_endian | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_power_little_endian | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_for_scientific_computing | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20190417 [slackware-security] libpng (SSA:2019-107-01)
mailing-list
cve.org
访问
cve.org
DSA-4435
vendor-advisory
cve.org
访问
cve.org
20190429 [SECURITY] [DSA 4435-1] libpng1.6 security update
mailing-list
cve.org
访问
cve.org
USN-3962-1
vendor-advisory
cve.org
访问
cve.org
USN-3991-1
vendor-advisory
cve.org
访问
cve.org
20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)
mailing-list
cve.org
访问
cve.org
20190523 [SECURITY] [DSA 4448-1] firefox-esr security update
mailing-list
cve.org
访问
cve.org
DSA-4448
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20190523 [SECURITY] [DLA 1800-1] firefox-esr security update
mailing-list
cve.org
访问
cve.org
RHSA-2019:1265
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:1267
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:1269
vendor-advisory
cve.org
访问
cve.org
DSA-4451
vendor-advisory
cve.org
访问
cve.org
20190527 [SECURITY] [DSA 4451-1] thunderbird security update
mailing-list
cve.org
访问
cve.org
[debian-lts-announce] 20190527 [SECURITY] [DLA 1806-1] thunderbird security update
mailing-list
cve.org
访问
cve.org
USN-3997-1
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:1484
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:1310
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:1308
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:1309
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:1534
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:1664
vendor-advisory
cve.org
访问
cve.org
108098
vdb-entry
cve.org
访问
cve.org
USN-4080-1
vendor-advisory
cve.org
访问
cve.org
USN-4083-1
vendor-advisory
cve.org
访问
cve.org
GLSA-201908-02
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2494
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2495
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:1916
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:1912
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2585
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2590
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2592
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2737
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
CVSS评分详情
5.3
MEDIUM
CVSS向量:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS版本:
3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2019-02-04 07:00:00
修改时间:
2024-08-04 20:46:45
创建时间:
2025-11-11 15:35:50
更新时间:
2025-11-11 15:54:18
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-7317 |
2025-11-11 15:20:15 | 2025-11-11 07:35:50 |
| NVD | nvd_CVE-2019-7317 |
2025-11-11 14:56:20 | 2025-11-11 07:44:19 |
| CNNVD | cnnvd_CNNVD-201902-012 |
2025-11-11 15:10:09 | 2025-11-11 07:54:18 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:54:18
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201902-012; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201902-012
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:19
cvss_score: 未提取 → 5.3; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 51; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.3
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 0 -> 51
- data_sources: ['cve'] -> ['cve', 'nvd']