Description
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5
1.6.6
1.6.7
1.6.8
1.6.9
1.6.10
1.6.11
1.6.12
1.6.13
1.6.14
1.6.15
1.6.16
1.6.17
1.6.18
1.6.19
1.6.20
1.6.21
1.6.22
1.6.23
1.6.24
1.6.25
1.6.26
1.6.27
1.6.28
1.6.29
1.6.30
1.6.31
1.6.32
1.6.33
1.6.34
1.6.35
1.6.36
1.6.37
1.6.38
1.6.39
1.6.40
1.6.41
1.6.42
1.6.43
1.6.44
1.6.45
1.6.46
1.6.47
1.6.48
1.6.49
1.6.50
1.6.51
1.6.52
1.6.53
1.6.54
1.6.55
Timeline
| 2026-03-07: | Advisory disclosed |
| 2026-03-07: | VulDB entry created |
| 2026-03-07: | VulDB entry last update |
Credits
biniam (VulDB User)
References
vuldb.com/?id.349658 (VDB-349658 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow)
vuldb.com/?ctiid.349658 (VDB-349658 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.761996 (Submit #761996 | libpng pnm2png 1.8.0 Integer Overflow to Buffer Overflow)
github.com/pnggroup/libpng/issues/794
github.com/biniamf/pocs/tree/main/pnm2png
github.com/pnggroup/libpng/