Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
References
| Link | Resource |
|---|---|
| https://gist.github.com/kittener/fbfdb9b5610c6b3db0d5dea045a07c60 | Third Party Advisory |
| https://github.com/pnggroup/libpng/issues/656 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2026-01-27 16:16
Updated : 2026-02-06 20:06
NVD link : CVE-2025-28162
Mitre link : CVE-2025-28162
CVE.ORG link : CVE-2025-28162
JSON object : View
Products Affected
libpng
- libpng
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
