SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   libpng Vendors:   libpng.sourceforge.net
(Trustix Issues Fix) libpng Buffer Offset Calculation Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1010878
SecurityTracker URL:  http://securitytracker.com/id/1010878
CVE Reference:   CAN-2004-0768   (Links to External Site)
Date:  Aug 5 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Prior to 1.2.6rc1, 1.0.16rc1
Description:   A buffer overflow vulnerability was reported in libpng. A remote user may be able to cause arbitrary code to be executed by an application using libpng.

The vendor reported that libpng contains a buffer overflow vulnerability similar to that reported in CVE CAN-2002-1363. The software does not properly calculate buffer offsets, which may allow for remote code execution.

The vendor has indicate that this flaw is "quite serious."

Impact:   A remote or local user may be able to cause arbitrary code to be executed by an application using libpng. The specific impact depends on the application using libpng.
Solution:   Trustix has released a fix, available at:

http://http.trustix.org/pub/trustix/updates/
ftp://ftp.trustix.org/pub/trustix/updates/

The MD5sums of the packages are:

2a916c1321aa5ff7fc380a41d1e69baa 2.0/rpms/libpng12-1.2.5-7tr.i586.rpm
dd28a857f30742276d5f5bb7ecdcdcb4 2.0/rpms/libpng12-devel-1.2.5-7tr.i586.rpm
7eeb7a4c22eb2007875c15e8e8024532 2.1/rpms/libpng-1.2.5-12tr.i586.rpm
2e6f72b81df71febbac21e361c26b913 2.1/rpms/libpng-devel-1.2.5-12tr.i586.rpm
87e50d10fd56dde63f645dd1a40d9f95 2.1/rpms/libpng-tools-1.2.5-12tr.i586.rpm
bc659bbb35dd41574729215f49eed2bc e2/libpng-1.2.5-12tr.i586.rpm
2b0b50f466ef4171ecf9e8e591aa174f e2/libpng-devel-1.2.5-12tr.i586.rpm
b03755eb3a750f8a4b333b312514061e e2/libpng-tools-1.2.5-12tr.i586.rpm

Vendor URL:  www.libpng.org/pub/png/libpng.html (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Trustix)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 5 2004 libpng Buffer Offset Calculation Overflow May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Thu, 5 Aug 2004 12:50:32 +0200
Subject:  TSLSA-2004-0040 - libpng


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0040

Package name:      libpng
Summary:           Several security holes
Date:              2004-08-05
Affected versions: Trustix Secure Linux 2.0
                   Trustix Secure Linux 2.1
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  libpng is a library of functions for creating and manipulating PNG
  (Portable Network Graphics) image format files.

Problem description:
  
  This update fixed the following security vulnerabilities:

  CAN-2004-0597 - Multiple buffer overflows exist, including when
  handling transparency chunk data, which could be exploited to cause
  arbitrary code to be executed when a specially crafted PNG image is
  processed

  CAN-2004-0598 - Multiple NULL pointer dereferences in
  png_handle_iCPP() and elsewhere could be exploited to cause an
  application to crash when a specially crafted PNG image is processed

  CAN-2004-0599 - Multiple integer overflows in png_handle_sPLT(),
  png_read_png() nctions and elsewhere could be exploited to cause an
  application to crash, or potentially arbitrary code to be executed,
  when a specially crafted PNG image is processed

  CAN-2004-0768 - A buffer overflow could be caused by incorrect
  calculation of buffer offsets, possibly leading to the execution of
  arbitrary code 

  Some of these problems was also fixed in our earier releases, this
  update includes an all in one patch that covers them all.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix Secure Linux are made available for public
  testing some time before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/horizon/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.0/> and
  <URI:http://www.trustix.org/errata/trustix-2.1/>
  or directly at
  <URI:http://www.trustix.org/errata/2004/0040>


MD5sums of the packages:
- --------------------------------------------------------------------------
2a916c1321aa5ff7fc380a41d1e69baa  2.0/rpms/libpng12-1.2.5-7tr.i586.rpm
dd28a857f30742276d5f5bb7ecdcdcb4  2.0/rpms/libpng12-devel-1.2.5-7tr.i586.rpm
7eeb7a4c22eb2007875c15e8e8024532  2.1/rpms/libpng-1.2.5-12tr.i586.rpm
2e6f72b81df71febbac21e361c26b913  2.1/rpms/libpng-devel-1.2.5-12tr.i586.rpm
87e50d10fd56dde63f645dd1a40d9f95  2.1/rpms/libpng-tools-1.2.5-12tr.i586.rpm
bc659bbb35dd41574729215f49eed2bc  e2/libpng-1.2.5-12tr.i586.rpm
2b0b50f466ef4171ecf9e8e591aa174f  e2/libpng-devel-1.2.5-12tr.i586.rpm
b03755eb3a750f8a4b333b312514061e  e2/libpng-tools-1.2.5-12tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhAdi8CEzsK9IksRApj1AJ9GsKxQiJjwLWtaSRsxlPeTkqcewACgkD99
ZVos/TC0WB1kw7hSlon8Kvg=
=8HDZ
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhC+i8CEzsK9IksRAuwIAJ0ZcuG9XA5dgt7oTqzauKwiioGPpACfXo29
dCKU2hxH3X/rdrD4M+JrSrQ=
=4LdN
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
tsl-announce@lists.trustix.org
http://lists.trustix.org/mailman/listinfo/tsl-announce

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC