SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   libpng Vendors:   libpng.sourceforge.net
(Trustix Issues Fix) libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code
SecurityTracker Alert ID:  1010877
SecurityTracker URL:  http://securitytracker.com/id/1010877
CVE Reference:   CVE-2004-0597, CVE-2004-0598, CVE-2004-0599   (Links to External Site)
Date:  Aug 5 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2.5 and 1.0.15
Description:   Several buffer overflow vulnerabilities were reported in libpng. A remote user may be able to execute arbitrary code on the target system.

Red Hat reported that Chris Evans discovered several buffer overflows in libpng during a code audit.

A remote user can create a specially crafted PNG file that, when opened by a target user with an application that uses libpng, will execute arbitrary code on the target user's system [CVE: CVE-2004-0597].

A NULL pointer dereference vulnerability [CVE: CVE-2004-0598] and several integer overflow issues [CVE: CVE-2004-0599] were also reported to be able to cause an affected application to crash when opening a malicious file.

Impact:   A remote user may be able to cause an affected application to crash or execute arbitrary code. The specific impact depends on the application using libpng.
Solution:   Trustix has released a fix, available at:

http://http.trustix.org/pub/trustix/updates/
ftp://ftp.trustix.org/pub/trustix/updates/

The MD5sums of the packages are:

2a916c1321aa5ff7fc380a41d1e69baa 2.0/rpms/libpng12-1.2.5-7tr.i586.rpm
dd28a857f30742276d5f5bb7ecdcdcb4 2.0/rpms/libpng12-devel-1.2.5-7tr.i586.rpm
7eeb7a4c22eb2007875c15e8e8024532 2.1/rpms/libpng-1.2.5-12tr.i586.rpm
2e6f72b81df71febbac21e361c26b913 2.1/rpms/libpng-devel-1.2.5-12tr.i586.rpm
87e50d10fd56dde63f645dd1a40d9f95 2.1/rpms/libpng-tools-1.2.5-12tr.i586.rpm
bc659bbb35dd41574729215f49eed2bc e2/libpng-1.2.5-12tr.i586.rpm
2b0b50f466ef4171ecf9e8e591aa174f e2/libpng-devel-1.2.5-12tr.i586.rpm
b03755eb3a750f8a4b333b312514061e e2/libpng-tools-1.2.5-12tr.i586.rpm

Vendor URL:  www.libpng.org/pub/png/libpng.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  Trustix Secure Linux 2.0, 2.1; Trustix Operating System - Enterprise Server 2

Message History:   This archive entry is a follow-up to the message listed below.
Aug 4 2004 libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code



 Source Message Contents

Subject:  TSLSA-2004-0040 - libpng


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0040

Package name:      libpng
Summary:           Several security holes
Date:              2004-08-05
Affected versions: Trustix Secure Linux 2.0
                   Trustix Secure Linux 2.1
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  libpng is a library of functions for creating and manipulating PNG
  (Portable Network Graphics) image format files.

Problem description:
  
  This update fixed the following security vulnerabilities:

  CAN-2004-0597 - Multiple buffer overflows exist, including when
  handling transparency chunk data, which could be exploited to cause
  arbitrary code to be executed when a specially crafted PNG image is
  processed

  CAN-2004-0598 - Multiple NULL pointer dereferences in
  png_handle_iCPP() and elsewhere could be exploited to cause an
  application to crash when a specially crafted PNG image is processed

  CAN-2004-0599 - Multiple integer overflows in png_handle_sPLT(),
  png_read_png() nctions and elsewhere could be exploited to cause an
  application to crash, or potentially arbitrary code to be executed,
  when a specially crafted PNG image is processed

  CAN-2004-0768 - A buffer overflow could be caused by incorrect
  calculation of buffer offsets, possibly leading to the execution of
  arbitrary code 

  Some of these problems was also fixed in our earier releases, this
  update includes an all in one patch that covers them all.

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix Secure Linux are made available for public
  testing some time before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/horizon/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/horizon/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.0/> and
  <URI:http://www.trustix.org/errata/trustix-2.1/>
  or directly at
  <URI:http://www.trustix.org/errata/2004/0040>


MD5sums of the packages:
- --------------------------------------------------------------------------
2a916c1321aa5ff7fc380a41d1e69baa  2.0/rpms/libpng12-1.2.5-7tr.i586.rpm
dd28a857f30742276d5f5bb7ecdcdcb4  2.0/rpms/libpng12-devel-1.2.5-7tr.i586.rpm
7eeb7a4c22eb2007875c15e8e8024532  2.1/rpms/libpng-1.2.5-12tr.i586.rpm
2e6f72b81df71febbac21e361c26b913  2.1/rpms/libpng-devel-1.2.5-12tr.i586.rpm
87e50d10fd56dde63f645dd1a40d9f95  2.1/rpms/libpng-tools-1.2.5-12tr.i586.rpm
bc659bbb35dd41574729215f49eed2bc  e2/libpng-1.2.5-12tr.i586.rpm
2b0b50f466ef4171ecf9e8e591aa174f  e2/libpng-devel-1.2.5-12tr.i586.rpm
b03755eb3a750f8a4b333b312514061e  e2/libpng-tools-1.2.5-12tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhAdi8CEzsK9IksRApj1AJ9GsKxQiJjwLWtaSRsxlPeTkqcewACgkD99
ZVos/TC0WB1kw7hSlon8Kvg=
=8HDZ
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFBEhC+i8CEzsK9IksRAuwIAJ0ZcuG9XA5dgt7oTqzauKwiioGPpACfXo29
dCKU2hxH3X/rdrD4M+JrSrQ=
=4LdN
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
tsl-announce@lists.trustix.org
http://lists.trustix.org/mailman/listinfo/tsl-announce

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC