libpng Bug in Processing Zero Length Chunks May Let Remote Users Deny Service or Execute Arbitrary Code
|
SecurityTracker Alert ID: 1019840 |
SecurityTracker URL: http://securitytracker.com/id/1019840
|
CVE Reference:
CVE-2008-1382
(Links to External Site)
|
Date: Apr 14 2008
|
Impact:
Denial of service via network, Disclosure of user information, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.0.6 and later
|
Description:
A vulnerability was reported in libpng in the processing of zero length chunks. A remote user can cause arbitrary code to be executed on the target system.
A remote user can create specially crafted data that, when processed by the target application using libpng, may execute arbitrary code on the target system. The vulnerability may also result in incorrect output, information leaks, or crashes.
The vendor was notified on April 5, 2008.
The original advisory is available at:
http://www.ocert.org/advisories/ocert-2008-003.html
Tavis Ormandy reported this vulnerability.
|
Impact:
A remote user may be able to execute arbitrary code on the target system.
|
Solution:
The vendor has issued a fixed version (1.2.27beta01). A fix is also planned for versions 1.2.27 and 1.0.33.
The vendor's advisory is available at:
http://libpng.sourceforge.net/Advisory-1.2.26.txt
|
Vendor URL: libpng.sourceforge.net/Advisory-1.2.26.txt (Links to External Site)
|
Cause:
State error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|