First published: Wed Jul 11 2018(Updated: )
libpng through version 1.6.34 is vulnerable to an integer overflow and resultant divide-by-zero in the pngrutil.c:png_check_chunk_length() function. An attacker could exploit this to cause a denial of service via crafted PNG file. Upstream Bug: <a href="https://sourceforge.net/p/libpng/bugs/278/">https://sourceforge.net/p/libpng/bugs/278/</a> Upstream Patch: <a href="https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2">https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libpng | <=1.6.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1599943 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1599943, upgrade to libpng version 1.6.35 or later.
libpng versions up to and including 1.6.34 are affected by REDHAT-BUG-1599943.
An attacker could exploit REDHAT-BUG-1599943 to cause a denial of service by using a crafted PNG file.
More information about REDHAT-BUG-1599943 can be found in the related bug reports and upstream discussions.