Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.9
Libpng PNM Converter Allows Local Code Execution
UBUNTU-CVE-2026-3713
Summary
A flaw in the Libpng PNM converter can allow an attacker to execute malicious code on a local system. This affects the PNM converter tool and can be exploited by a local attacker. To protect your system, update Libpng to a version higher than 1.6.55.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| canonical | libpng | All versions | – |
| canonical | libpng | All versions | – |
| canonical | libpng1.6 | All versions | – |
| canonical | libpng1.6 | All versions | – |
| canonical | libpng1.6 | All versions | – |
| canonical | libpng1.6 | All versions | – |
| canonical | libpng1.6 | All versions | – |
| canonical | libpng1.6 | All versions | – |
Original title
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation o...
Original description
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
osv CVSS3.1
5.3
osv CVSS4.0
6.9
- https://ubuntu.com/security/CVE-2026-3713 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-3713 Third Party Advisory
- https://github.com/pnggroup/libpng/issues/794 Third Party Advisory
- https://github.com/biniamf/pocs/tree/main/pnm2png Third Party Advisory
- https://github.com/pnggroup/libpng/ Third Party Advisory
- https://vuldb.com/?ctiid.349658 Third Party Advisory
- https://vuldb.com/?id.349658 Third Party Advisory
- https://vuldb.com/?submit.761996 Third Party Advisory
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026