Hide Forgot
An integer overflow leading to a heap-based buffer overflow was found in the png_set_unknown_chunks() API function of libpng. A attacker could create a specially-crafated image file and render it with an application written to explicitly call png_set_unknown_chunks() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application. The vendor mentions that internal calls use safe values. These issues could potentially affect applications that use the libpng API. Apparently no such applications were identified. Reference: http://sourceforge.net/p/libpng/bugs/199/ http://seclists.org/oss-sec/2014/q2/83
This issue was addressed by the following upstream commit: http://sourceforge.net/p/libpng/code/ci/9dd2bfafe50de0e3204be81a90303760d26a697c and was later enhanced by the following commit: http://sourceforge.net/p/libpng/code/ci/2414bd99d8c76f92ca9272f1b1b1eff55709298a Upstream released libpng-1.6.0 and libpng-1.5.14 to address this issue.
In libpng-1.5.14 the following commits were used by upstream to address this flaw: http://sourceforge.net/p/libpng/code/ci/1a3d6e3cf3082a0da998dbf402d384a589488859 http://sourceforge.net/p/libpng/code/ci/77a817bfc298a221e3e623acf73c2a1e726c4ec6 http://sourceforge.net/p/libpng/code/ci/bec9ca9b8aa0cf16d2cde1757379afbe9adbe7d9
Created libpng tracking bugs for this issue: Affects: fedora-19 [bug 1086669]
Created libpng10 tracking bugs for this issue: Affects: epel-6 [bug 1086673]
Created libpng15 tracking bugs for this issue: Affects: fedora-20 [bug 1086670]
Created mingw-libpng tracking bugs for this issue: Affects: fedora-19 [bug 1086671]
Created mingw32-libpng tracking bugs for this issue: Affects: epel-5 [bug 1086672] Affects: epel-6 [bug 1086674]
Statement: Not vulnerable. This issue does not affect the version of libpng as shipped with Red Hat Enterprise Linux 5 and 6.