Advisory Published
Updated

REDHAT-BUG-608238

First published: Sat Jun 26 2010(Updated: )

Description of problem: <a href="http://www.libpng.org/pub/png/libpng.html">http://www.libpng.org/pub/png/libpng.html</a> Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site). This vulnerability has been assigned ID <a href="https://access.redhat.com/security/cve/CVE-2010-1205">CVE-2010-1205</a> (via Mozilla). An additional memory-leak bug, involving images with malformed sCAL chunks, is also present; it could lead to an application crash (denial of service) when viewing such images. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:

Affected SoftwareAffected VersionHow to fix
Libp2p<=1.4.2
Libp2p<=1.2.43

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of REDHAT-BUG-608238?

    The severity of REDHAT-BUG-608238 is categorized as moderate.

  • How do I fix REDHAT-BUG-608238?

    To fix REDHAT-BUG-608238, update libpng to version 1.4.3 or later, or 1.2.44 or later for older versions.

  • What versions of libpng are affected by REDHAT-BUG-608238?

    REDHAT-BUG-608238 affects libpng versions up to and including 1.4.2 and versions up to 1.2.43 in the older series.

  • What type of applications are impacted by REDHAT-BUG-608238?

    Progressive applications such as web browsers and the rpng2 demo app are impacted by REDHAT-BUG-608238.

  • Is there a known exploit for REDHAT-BUG-608238?

    Yes, REDHAT-BUG-608238 can lead to vulnerabilities that may be exploited through malformed PNG files.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203