First published: Sat Aug 10 2002(Updated: )
Buffer overflow in libpng 1.0.12-3.woody.2 and libpng3 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0, and other operating systems, may allow attackers to cause a denial of service and possibly execute arbitrary code, a different vulnerability than CVE-2002-0728.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libpng | ||
debian/libpng3 | ||
Libpng | =1.0.12 | |
Greg Roelofs libpng | =1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0660 is considered a critical vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2002-0660, you should upgrade to a patched version of libpng that addresses this buffer overflow issue.
CVE-2002-0660 affects libpng version 1.0.12-3.woody.2 and libpng3 version 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0.
Yes, CVE-2002-0660 may allow attackers to exploit the buffer overflow remotely, leading to system compromise.
While CVE-2002-0660 is highlighted in Debian systems, it may affect other operating systems with the vulnerable versions of libpng.