{"id":"CVE-2018-13785","details":"In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.","modified":"2026-05-15T12:03:06.501655471Z","published":"2018-07-09T13:29:00.443Z","related":["SUSE-SU-2018:3868-1","SUSE-SU-2018:3920-1","SUSE-SU-2018:3921-1","SUSE-SU-2018:3933-1","SUSE-SU-2018:3933-2","SUSE-SU-2018:4064-1","SUSE-SU-2018:4064-2","SUSE-SU-2019:0049-1","SUSE-SU-2019:0049-2","SUSE-SU-2019:0057-1","SUSE-SU-2019:0057-2","SUSE-SU-2019:0058-1","SUSE-SU-2019:1398-1","SUSE-SU-2019:1398-2","openSUSE-SU-2019:0043-1","openSUSE-SU-2019:1530-1","openSUSE-SU-2024:10876-1","openSUSE-SU-2024:10972-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"],"extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"17.10"},{"last_affected":"18.04"}],"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux"},{"cpes":["cpe:2.3:a:oracle:jdk:1.6.0:update201:*:*:*:*:*:*","cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*","cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*","cpe:2.3:a:oracle:jdk:11.0.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"1.6.0-update201"},{"last_affected":"1.7.0-update191"},{"last_affected":"1.8.0-update181"},{"last_affected":"11.0.0"}],"source":"CPE_FIELD","vendor_product":"oracle:jdk"},{"cpes":["cpe:2.3:a:oracle:jre:1.6.0:update201:*:*:*:*:*:*","cpe:2.3:a:oracle:jre:1.7.0:update191:*:*:*:*:*:*","cpe:2.3:a:oracle:jre:1.8.0:update181:*:*:*:*:*:*","cpe:2.3:a:oracle:jre:11.0.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"1.6.0-update201"},{"last_affected":"1.7.0-update191"},{"last_affected":"1.8.0-update181"},{"last_affected":"11.0.0"}],"source":"CPE_FIELD","vendor_product":"oracle:jre"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_desktop"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server"},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"6.0"},{"last_affected":"7.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_workstation"}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105599"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041889"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3000"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3001"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3002"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3003"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3007"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3008"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3533"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3534"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3671"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3672"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3779"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3852"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-10"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20181018-0001/"},{"type":"ADVISORY","url":"https://sourceforge.net/p/libpng/bugs/278/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3712-1/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"FIX","url":"https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}