SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   libpng Vendors:   libpng.sourceforge.net
(Debian Issues Fix) libpng Image Height Buffer Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011850
SecurityTracker URL:  http://securitytracker.com/id/1011850
CVE Reference:   CAN-2004-0599   (Links to External Site)
Updated:  Nov 4 2004
Original Entry Date:  Oct 21 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A buffer overflow vulnerability was reported in libpng in the processing of images with excessive height. A remote user may be able to execute arbitrary code on the target system.

Debian reported that a specially crafted image may trigger a buffer overflow in png_read_png() in 'pngread.c'.

Impact:   A remote user may be able to execute arbitrary code on a system that uses libpng.
Solution:   Debian has released a fix for the stable distribution (woody) in version 1.0.12-3.woody.9 and for the unstable distribution (sid) in version 1.0.15-8.

Debian GNU/Linux 3.0 alias woody:

Source archives:

http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc
Size/MD5 checksum: 580 7df7d1e0bbd2332551a14cc0a21dddf7
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz
Size/MD5 checksum: 10396 dbf46963e7b26473fffba63a92791286
http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
Size/MD5 checksum: 481387 3329b745968e41f6f9e55a4d04a4964c

Alpha architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 130374 1044ec55646f8e94e218bf4613db1f60
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb
Size/MD5 checksum: 270440 74a5b9e3bc1b2fc2648133e196894b4f

ARM architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 109148 60e7475df4f824043242559b7d64322e
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb
Size/MD5 checksum: 241496 f9ad072eb50a9391ce4b105eff9b2cba

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 107434 e81d90d93fc69329f1fc842666ab8bf2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb
Size/MD5 checksum: 227648 a5495e210300e511e7c265e86303c909

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 147520 5292b0c17956697fa682a95be34abc0d
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb
Size/MD5 checksum: 271938 ae7b7fed469735915bbdf87ab02f80a3

HP Precision architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 128830 b1937fc261ba66c8b69605c0f8df9305
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb
Size/MD5 checksum: 262630 be93d764c002923fb1e6d5385b12e200

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 104172 86a18a750a19efbe94f8b79d9e4e89c8
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb
Size/MD5 checksum: 220804 d4b278997d86fe7cd824f2ad820a8466

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 109184 b825d9e4e59ed06f5ff718d86c078714
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb
Size/MD5 checksum: 240698 883d442e57eef30ad86251ce2ffed701

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 109102 eb85fee5ef0e9516372a7e245fd781ce
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
Size/MD5 checksum: 240576 da9b75f48689e9277b8a053c014e8ddc

PowerPC architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 110504 b7ab6493588e05c09811e3f58fa747b2
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
Size/MD5 checksum: 234800 1e1bacb0bbe2d80166d4ce9f96348828

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 110520 29172e2fc592785d44b5779ed7787f08
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb
Size/MD5 checksum: 229560 2577f1ecee02f71af34ca9aecbd70dd7

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 110564 2eac357f311054279ef941a87befb62f
http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb
Size/MD5 checksum: 232302 7691bd27595acd87249be24746f47186

Vendor URL:  libpng.sourceforge.net/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Debian)

Message History:   This archive entry is a follow-up to the message listed below.
Oct 21 2004 libpng Image Height Buffer Overflow May Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Wed, 20 Oct 2004 18:04:49 +0200 (CEST)
Subject:  [SECURITY] [DSA 570-1] New libpng packages fix several vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 570-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
October 20th, 2004                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : libpng
Vulnerability  : integer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0955

Several integer overflows have been discovered by its upstream
developers in libpng, a commonly used library to display PNG graphics.
They could be exploited to cause arbitrary code to be executed when a
specially crafted PNG image is processed.

For the stable distribution (woody) this problem has been fixed in
version 1.0.12-3.woody.9.

For the unstable distribution (sid) this problem has been fixed in
version 1.0.15-8.

We recommend that you upgrade your libpng packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.dsc
      Size/MD5 checksum:      580 7df7d1e0bbd2332551a14cc0a21dddf7
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12-3.woody.9.diff.gz
      Size/MD5 checksum:    10396 dbf46963e7b26473fffba63a92791286
    http://security.debian.org/pool/updates/main/libp/libpng/libpng_1.0.12.orig.tar.gz
      Size/MD5 checksum:   481387 3329b745968e41f6f9e55a4d04a4964c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_alpha.deb
      Size/MD5 checksum:   130374 1044ec55646f8e94e218bf4613db1f60
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_alpha.deb
      Size/MD5 checksum:   270440 74a5b9e3bc1b2fc2648133e196894b4f

  ARM architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_arm.deb
      Size/MD5 checksum:   109148 60e7475df4f824043242559b7d64322e
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_arm.deb
      Size/MD5 checksum:   241496 f9ad072eb50a9391ce4b105eff9b2cba

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_i386.deb
      Size/MD5 checksum:   107434 e81d90d93fc69329f1fc842666ab8bf2
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_i386.deb
      Size/MD5 checksum:   227648 a5495e210300e511e7c265e86303c909

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_ia64.deb
      Size/MD5 checksum:   147520 5292b0c17956697fa682a95be34abc0d
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_ia64.deb
      Size/MD5 checksum:   271938 ae7b7fed469735915bbdf87ab02f80a3

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_hppa.deb
      Size/MD5 checksum:   128830 b1937fc261ba66c8b69605c0f8df9305
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_hppa.deb
      Size/MD5 checksum:   262630 be93d764c002923fb1e6d5385b12e200

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_m68k.deb
      Size/MD5 checksum:   104172 86a18a750a19efbe94f8b79d9e4e89c8
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_m68k.deb
      Size/MD5 checksum:   220804 d4b278997d86fe7cd824f2ad820a8466

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mips.deb
      Size/MD5 checksum:   109184 b825d9e4e59ed06f5ff718d86c078714
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mips.deb
      Size/MD5 checksum:   240698 883d442e57eef30ad86251ce2ffed701

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_mipsel.deb
      Size/MD5 checksum:   109102 eb85fee5ef0e9516372a7e245fd781ce
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_mipsel.deb
      Size/MD5 checksum:   240576 da9b75f48689e9277b8a053c014e8ddc

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_powerpc.deb
      Size/MD5 checksum:   110504 b7ab6493588e05c09811e3f58fa747b2
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_powerpc.deb
      Size/MD5 checksum:   234800 1e1bacb0bbe2d80166d4ce9f96348828

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_s390.deb
      Size/MD5 checksum:   110520 29172e2fc592785d44b5779ed7787f08
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_s390.deb
      Size/MD5 checksum:   229560 2577f1ecee02f71af34ca9aecbd70dd7

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/libp/libpng/libpng2_1.0.12-3.woody.9_sparc.deb
      Size/MD5 checksum:   110564 2eac357f311054279ef941a87befb62f
    http://security.debian.org/pool/updates/main/libp/libpng/libpng2-dev_1.0.12-3.woody.9_sparc.deb
      Size/MD5 checksum:   232302 7691bd27595acd87249be24746f47186


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBdoygW5ql+IAeqTIRAoMNAKCfndrl8yChYh6+2naQdhcT+xpYPACeOeUE
ZCFqX8nZqf7QJLxtj9G1wKI=
=YmFn
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC