Red Hat Bugzilla – Bug 137247
CAN-2004-0990 integer overflow in PNG handling.
Last modified: 2015-03-04 20:14:27 EST
This was reported to bugtraq.
There is an integer overflow when allocating memory in the routine
loading PNG image files. This later leads to heap data structures being
overwritten. If an attacker tricked a user into loading a malicious
they could leverage this into executing arbitrary code in the context
user opening image. Many programs use GD, such as ImageMagick, and more
importantly it is also the image library used for PHP, and there is a Perl
module as well. One possibile target would be PHP driven photo
let users upload images. Some of them will resize/compress the image
user uploads them. If this is done using GD, this could be used to
on the server. There is a mitigating factor, in order to reach the
code, a large amount of memory needs to be allocated. My 128MB p2
one allocation before it reached the overflow. However, I think on a
with lots of memory and swap space, that won't be a problem.
The vulnerable code occurs in the file gd_png.c, in the function
gdImageCreateFromPngCtx(), which is called by gdImageCreateFromPng(). The
function is used to load an image file into GD data structures. The
occurs when allocating memory for the image rows, line 314 or so ( I
comments so line number might be off). Two user supplied values are
together (rowbytes * height), and used to allocate memory for an array of
pointers. This pointer array is then passed to the png_read_image()
which belongs to the libPNG library. In that function, the pointers
to the png_read_row() function. The data for the rows is decompressed
zLib function inflate(), and then passed to the png_combine_row()
where the deflated data is memcpy()'d into the heap buffer.
require using zLib functions to compress the payload. Successful
would lead to executing arbitrary code.
This issue is also going to have to be fixed in FC3.