SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Multimedia)  >   libpng Vendors:   libpng.sourceforge.net
(Gentoo Issues Fix) libpng Memory Access Violation When Creating Error Messages May Cause Denial of Service Conditions
SecurityTracker Alert ID:  1010195
SecurityTracker URL:  http://securitytracker.com/id/1010195
CVE Reference:   CAN-2004-0421   (Links to External Site)
Date:  May 18 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in libpng. A remote user can create a PNG image that, when processed by libpng, may cause denial of service conditions.

Mandrake reported that when libpng creates an error message, libpng may access invalid memory locations. As a result, an application using libpng may crash or core dump when processing certain PNG images, the report said.

Steve Grubb is credited with discovering this flaw.

Impact:   A remote user can create a malformed PNG image that, when processed by an application using libpng, may cause the application to crash. The specific impact depends on the application using libpng.
Solution:   Gentoo has released a fix and indicates that all users of libpng should upgrade to the latest stable version:

# emerge sync

# emerge -pv ">=media-libs/libpng-1.2.5-r5"
# emerge ">=media-libs/libpng-1.2.5-r5"

The advisory also indicates that you should also run revdep-rebuild to rebuild any packages that depend on older versions of libpng:

# revdep-rebuild

Vendor URL:  www.libpng.org/pub/png/libpng.html (Links to External Site)
Cause:   Access control error, Resource error
Underlying OS:   Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 30 2004 libpng Memory Access Violation When Creating Error Messages May Cause Denial of Service Conditions



 Source Message Contents

Date:  Fri, 14 May 2004 22:14:48 +0200
Subject:  [gentoo-announce] [ GLSA 200405-06 ] libpng denial of service vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200405-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: libpng denial of service vulnerability
      Date: May 14, 2004
      Bugs: #49887
        ID: 200405-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A bug in the libpng library can be abused to crash programs making use
of that library to decode PNG images.

Background
==========

libpng is a standard library used to process PNG (Portable Network
Graphics) images.

Affected packages
=================

    -------------------------------------------------------------------
     Package            /   Vulnerable   /                  Unaffected
    -------------------------------------------------------------------
  1  media-libs/libpng      <= 1.2.5-r4                    >= 1.2.5-r5

Description
===========

libpng provides two functions (png_chunk_error and png_chunk_warning)
for default error and warning messages handling. These functions do not
perform proper bounds checking on the provided message, which is
limited to 64 bytes. Programs linked against this library may crash
when handling a malicious PNG image.

Impact
======

This vulnerability could be used to crash various programs using the
libpng library, potentially resulting in a denial of service attack on
vulnerable daemon processes.

Workaround
==========

There is no known workaround at this time. All users are advised to
upgrade to the latest available version of libpng.

Resolution
==========

All users of libpng should upgrade to the latest stable version:

    # emerge sync

    # emerge -pv ">=media-libs/libpng-1.2.5-r5"
    # emerge ">=media-libs/libpng-1.2.5-r5"

You should also run revdep-rebuild to rebuild any packages that depend
on older versions of libpng :

    # revdep-rebuild

References
==========

  [ 1 ] CAN-2004-0421
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

     http://security.gentoo.org/glsa/glsa-200405-06.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Technologies, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFApSi3vcL1obalX08RAkIkAKCp2IIUHRycJ6IgSGuXl7drtGu+fgCfWb49
l/eaSvZlK4R5nm+OtlnM4ys=
=KFv5
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC