First published: Sun Jul 22 2012(Updated: )
Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
libp2p | =1.5.7 | |
libp2p | =1.5.1 | |
libp2p | =1.5.6-beta | |
libp2p | =1.5.3-beta | |
libp2p | =1.5.4-beta | |
libp2p | =1.5.5 | |
libp2p | =1.5.0-beta | |
libp2p | =1.5.1-beta | |
libp2p | =1.5.4 | |
libp2p | =1.5.6 | |
libp2p | =1.5.5-beta | |
libp2p | =1.5.2 | |
libp2p | =1.5.7-beta | |
libp2p | =1.5.2-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3464 has been categorized as a critical vulnerability due to its potential to cause a denial of service and possibly execute arbitrary code.
To fix CVE-2011-3464, upgrade to libpng version 1.5.8 or later, which addresses this vulnerability.
CVE-2011-3464 affects all versions of libpng from 1.5.1 to 1.5.7, including beta versions.
Yes, CVE-2011-3464 can be exploited by remote attackers triggering a stack-based buffer overflow.
Exploiting CVE-2011-3464 may result in application crashes or could allow an attacker to execute arbitrary code on the affected system.