First published: Thu Aug 05 2004(Updated: )
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft MSN Messenger | =6.1 | |
Greg Roelofs Libpng | <=1.2.5 | |
Microsoft MSN Messenger | =6.2 | |
Microsoft Windows Messenger | =5.0 | |
Microsoft Windows Media Player | =9 | |
Microsoft Windows Me | ||
Microsoft Windows 98SE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.