Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64506: CWE-125: Out-of-bounds Read in pnggroup libpng

0
Medium
VulnerabilityCVE-2025-64506cvecve-2025-64506cwe-125
Published: Mon Nov 24 2025 (11/24/2025, 23:41:09 UTC)
Source: CVE Database V5
Vendor/Project: pnggroup
Product: libpng

Description

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.

AI-Powered Analysis

AILast updated: 12/02/2025, 00:30:58 UTC

Technical Analysis

CVE-2025-64506 is a heap buffer over-read vulnerability identified in the libpng library, specifically in the png_write_image_8bit function used for writing 8-bit PNG images. Libpng is widely used for reading and manipulating PNG raster images across many applications and platforms. The vulnerability affects versions from 1.6.0 up to but not including 1.6.51. The root cause is a faulty conditional guard that mistakenly allows 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data to be processed by code paths intended for 16-bit input. This results in reads of up to 2 bytes beyond the allocated heap buffer, causing out-of-bounds memory access. While this does not directly enable arbitrary code execution or data corruption, it can cause application instability, crashes, or denial of service. Exploitation requires local privileges and user interaction to supply a crafted PNG image that triggers the vulnerable code path. No known exploits are currently in the wild. The vulnerability has been patched in libpng version 1.6.51, and upgrading to this or later versions is recommended. The CVSS v3.1 base score is 6.1, indicating medium severity, with attack vector local, low attack complexity, no privileges required, user interaction needed, and impact limited to confidentiality loss and availability disruption.

Potential Impact

For European organizations, the primary impact of CVE-2025-64506 lies in potential denial of service conditions caused by application crashes when processing maliciously crafted PNG images. This can disrupt services that rely on image processing, such as content management systems, graphic design tools, web applications, and any software embedding libpng for image manipulation. Confidentiality impact is limited but possible if sensitive memory is inadvertently exposed during the out-of-bounds read, though no direct data leakage or code execution is reported. The vulnerability requires local access and user interaction, reducing the risk of remote exploitation but still posing a threat in environments where users handle untrusted images, such as email clients or file-sharing platforms. Organizations in sectors with high multimedia usage, including media, publishing, and software development, may face operational disruptions. Failure to patch could also increase exposure to targeted attacks leveraging this vulnerability as part of a multi-stage exploit chain. Overall, the impact is moderate but warrants timely remediation to maintain service availability and security posture.

Mitigation Recommendations

European organizations should prioritize upgrading libpng to version 1.6.51 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implementing strict input validation and sanitization of PNG images before processing can reduce risk. Employ sandboxing or containerization for applications handling untrusted images to limit the impact of potential crashes. Monitoring application logs for abnormal terminations or errors related to PNG processing can help detect exploitation attempts. Additionally, restricting local user permissions and educating users about the risks of opening untrusted image files can mitigate exploitation likelihood. Security teams should integrate vulnerability scanning for libpng versions into their asset management and patching workflows. Where possible, use alternative image processing libraries with no known vulnerabilities until patches are applied. Finally, maintain regular backups and incident response plans to quickly recover from denial of service incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.399Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6924efddc5f5f1e21b5dde4e

Added to database: 11/24/2025, 11:53:01 PM

Last enriched: 12/2/2025, 12:30:58 AM

Last updated: 1/9/2026, 4:46:58 AM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats