libpng Memory Error in png_inflate() Lets Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1026823 |
SecurityTracker URL: http://securitytracker.com/id/1026823
|
CVE Reference:
CVE-2011-3045
(Links to External Site)
|
Date: Mar 20 2012
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in libpng. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create a specially crafted Portable Network Graphics (PNG) image file that, when loaded by the target user via an application that uses libpng, will trigger an out-of-bounds heap buffer read and execute arbitrary code on the target system. The code will run with the privileges of the target user or application running libpng.
The expansion of certain iCCP, iTXt, and zTXt PNG image file chunks is affected.
|
Impact:
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
The vendor has issued a source code fix, available at:
http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b#patch3
|
Vendor URL: www.libpng.org/pub/png/libpng.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|