Bug 201936 - libpng Graphics Library Chunk Error Processing Buffer Overflow
Summary: libpng Graphics Library Chunk Error Processing Buffer Overflow
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: libpng   
(Show other bugs)
Version: rhl7.3
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: http://www.securityfocus.com/bid/1869...
Depends On:
TreeView+ depends on / blocked
Reported: 2006-08-09 20:53 UTC by John Dalbec
Modified: 2008-05-01 15:38 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-08-30 19:57:06 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
libpng-1.2.8-CVE-2006-3334.patch (474 bytes, patch)
2006-08-27 18:19 UTC, jens.koerber
no flags Details | Diff

Description John Dalbec 2006-08-09 20:53:54 UTC
06.26.12 CVE: Not Available
Platform: Linux
Title: libpng Graphics Library Chunk Error Processing Buffer Overflow
Description: libpng is the official Portable Network Graphics (PNG)
reference library. It is vulnerable to a buffer overflow issue when
handling malformed PNG files. libpng3 version 1.2.12 is not
Ref: http://www.securityfocus.com/bid/18698/info

(3) HIGH: LibPNG Chunk Processing Buffer Overflow
LibPNG versions 1.2.11 and prior
Description: LibPNG, a popular library for processing PNG (Portable
Network Graphics) images, is installed and used by default on all Linux,
UNIX, BSD, and Mac OS X systems. Certain applications may also install
the library on Windows systems. The library contains a buffer overflow
that can be triggered by a specially crafted PNG image "chunk". Any
application that delivers a malformed PNG image (web, email, IM) can
exploit the overflow to execute arbitrary code with the privileges of
the current user. Since LibPNG is open source, the technical details for
this exploit can be obtained by examining the fixed code.

Status: LibPNG confirmed, updates available.

Council Site Actions:  The responding council sites using the affected
software plan to install any patches that come out for OS or
applications they use within regular patching intervals.  One also said
they don't run graphical applications that take input from the outside
world on their UNIX systems.

LibPNG Release Notes (contains vulnerability announcement)
PNG File Format
LibPNG Home Page
SecurityFocus BID

Comment 1 jens.koerber 2006-08-27 18:19:04 UTC
Created attachment 135008 [details]


Comment 2 Jesse Keating 2007-08-30 19:57:06 UTC
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.

Note You need to log in before you can comment on or make changes to this bug.