SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Mozilla Browser Vendors:   Mozilla.org
(Mozilla Issues Fix for Mozilla) libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code
SecurityTracker Alert ID:  1010888
SecurityTracker URL:  http://securitytracker.com/id/1010888
CVE Reference:   CVE-2004-0597, CVE-2004-0598, CVE-2004-0599   (Links to External Site)
Date:  Aug 6 2004
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.7.2
Description:   Several buffer overflow vulnerabilities were reported in libpng. A remote user may be able to execute arbitrary code on the target system. The Mozilla browser is affected.

Red Hat reported that Chris Evans discovered several buffer overflows in libpng during a code audit.

A remote user can create a specially crafted PNG file that, when opened by a target user with an application that uses libpng, will execute arbitrary code on the target user's system [CVE: CVE-2004-0597].

A NULL pointer dereference vulnerability [CVE: CVE-2004-0598] and several integer overflow issues [CVE: CVE-2004-0599] were also reported to be able to cause an affected application to crash when opening a malicious file.

Impact:   A remote user may be able to cause an affected application to crash or execute arbitrary code. The specific impact depends on the application using libpng.
Solution:   The vendor has released a fixed version of Mozilla (1.7.2), which is affected by the libpng vulnerability, available at:

http://www.mozilla.org/download.html

Vendor URL:  bugzilla.mozilla.org/show_bug.cgi?id=251381 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 4 2004 libpng Buffer Overflows May Let Remote Users Crash the Application or Execute Arbitrary Code



 Source Message Contents

Subject:  http://bugzilla.mozilla.org/show_bug.cgi?id=251381


Fixed in Mozilla 1.7.2/Firefox 0.9.3/Thunderbird 0.7.3

83  	
buffer and integer overflows in libpng (251381)  	
critical / high  	
remote execution  	
Multiple flaws in libpng were announced, the worst of which could lead to remote code 
execution via buffer overflow. CAN-2004-0597, CAN-2004-0598, CAN-2004-0599   	
Chris Evans  	
2004-08-03

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC