Bug 201936 - libpng Graphics Library Chunk Error Processing Buffer Overflow
Summary: libpng Graphics Library Chunk Error Processing Buffer Overflow
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: libpng
Version: rhl7.3
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: http://www.securityfocus.com/bid/1869...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-08-09 20:53 UTC by John Dalbec
Modified: 2008-05-01 15:38 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2007-08-30 19:57:06 UTC
Embargoed:


Attachments (Terms of Use)
libpng-1.2.8-CVE-2006-3334.patch (474 bytes, patch)
2006-08-27 18:19 UTC, jens.koerber
no flags Details | Diff

Description John Dalbec 2006-08-09 20:53:54 UTC
06.26.12 CVE: Not Available
Platform: Linux
Title: libpng Graphics Library Chunk Error Processing Buffer Overflow
Description: libpng is the official Portable Network Graphics (PNG)
reference library. It is vulnerable to a buffer overflow issue when
handling malformed PNG files. libpng3 version 1.2.12 is not
vulnerable.
Ref: http://www.securityfocus.com/bid/18698/info

(3) HIGH: LibPNG Chunk Processing Buffer Overflow
Affected:
LibPNG versions 1.2.11 and prior
 
Description: LibPNG, a popular library for processing PNG (Portable
Network Graphics) images, is installed and used by default on all Linux,
UNIX, BSD, and Mac OS X systems. Certain applications may also install
the library on Windows systems. The library contains a buffer overflow
that can be triggered by a specially crafted PNG image "chunk". Any
application that delivers a malformed PNG image (web, email, IM) can
exploit the overflow to execute arbitrary code with the privileges of
the current user. Since LibPNG is open source, the technical details for
this exploit can be obtained by examining the fixed code.

Status: LibPNG confirmed, updates available.

Council Site Actions:  The responding council sites using the affected
software plan to install any patches that come out for OS or
applications they use within regular patching intervals.  One also said
they don't run graphical applications that take input from the outside
world on their UNIX systems.

References:
LibPNG Release Notes (contains vulnerability announcement)
http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=428123 
PNG File Format
http://www.w3.org/TR/PNG/ 
LibPNG Home Page
http://www.libpng.org/pub/png/   
SecurityFocus BID
http://www.securityfocus.com/bid/18698

Comment 1 jens.koerber 2006-08-27 18:19:04 UTC
Created attachment 135008 [details]
libpng-1.2.8-CVE-2006-3334.patch

>>

Comment 2 Jesse Keating 2007-08-30 19:57:06 UTC
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.


Note You need to log in before you can comment on or make changes to this bug.