CVE-2011-2690
Publication date 17 July 2011
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| chromium-browser | ||
| firefox | ||
| libpng | ||
Notes
Patch details
| Package | Patch details | 
|---|---|
| libpng | 
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 
                      
                      
                         | 
                  
| Attack vector | Network | 
| Attack complexity | Low | 
| Privileges required | None | 
| User interaction | Required | 
| Scope | Unchanged | 
| Confidentiality | High | 
| Integrity impact | High | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
References
Related Ubuntu Security Notices (USN)
- USN-1175-1
 - libpng vulnerabilities
 - 26 July 2011