[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:151 -- Mandriva libpng

ID: oval:org.secpod.oval:def:301068Date: (C)2012-01-07   (M)2023-11-13
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in libpng: The png_format_buffer function in pngerror.c in libpng allows remote attackers to cause a denial of service via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression . Buffer overflow in libpng, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image . The png_err function in pngerror.c in libpng makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service via a crafted PNG image . NOTE: This does not affect the binary packages in Mandriva, but could affect users if PNG_NO_ERROR_TEXT is defined using the libpng-source-1.?.?? package. The png_handle_sCAL function in pngrutil.c in libpng does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2010.1
Product:
libpng
Reference:
MDVSA-2011:151
CVE-2011-2692
CVE-2011-2691
CVE-2011-2690
CVE-2011-2501
CVE    4
CVE-2011-2501
CVE-2011-2690
CVE-2011-2691
CVE-2011-2692
...
CPE    1
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies