First published: Wed Mar 03 2010(Updated: )
The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libpng Libpng | >=1.0.0<1.0.53 | |
Libpng Libpng | >=1.2.0<1.2.43 | |
Libpng Libpng | >=1.4.0<1.4.1 | |
Apple Mac OS X | <10.6.5 | |
Fedoraproject Fedora | =11 | |
Fedoraproject Fedora | =13 | |
Fedoraproject Fedora | =12 | |
SUSE Linux Enterprise Server | =10-sp3 | |
openSUSE openSUSE | =11.1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
openSUSE openSUSE | =11.0 | |
openSUSE openSUSE | =11.2 | |
SUSE Linux Enterprise Server | =11 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =8.10 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =6.06 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.