Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
References
| Link | Resource |
|---|---|
| https://gist.github.com/kittener/fbfdb9b5610c6b3db0d5dea045a07c60 | Third Party Advisory |
| https://github.com/pnggroup/libpng/issues/656 | Exploit Issue Tracking |
Configurations
History
06 Feb 2026, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/kittener/fbfdb9b5610c6b3db0d5dea045a07c60 - Third Party Advisory | |
| References | () https://github.com/pnggroup/libpng/issues/656 - Exploit, Issue Tracking | |
| First Time |
Libpng
Libpng libpng |
|
| CPE | cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* |
29 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-120 |
27 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 16:16
Updated : 2026-02-06 20:06
NVD link : CVE-2025-28162
Mitre link : CVE-2025-28162
CVE.ORG link : CVE-2025-28162
JSON object : View
Products Affected
libpng
- libpng
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
