First published: Sat Jun 26 2010(Updated: )
Description of problem: <a href="http://www.libpng.org/pub/png/libpng.html">http://www.libpng.org/pub/png/libpng.html</a> Several versions of libpng through 1.4.2 (and through 1.2.43 in the older series) contain a bug whereby progressive applications such as web browsers (or the rpng2 demo app included in libpng) could receive an extra row of image data beyond the height reported in the header, potentially leading to an out-of-bounds write to memory (depending on how the application is written) and the possibility of execution of an attacker's code with the privileges of the libpng user (including remote compromise in the case of a libpng-based browser visiting a hostile web site). This vulnerability has been assigned ID <a href="https://access.redhat.com/security/cve/CVE-2010-1205">CVE-2010-1205</a> (via Mozilla). An additional memory-leak bug, involving images with malformed sCAL chunks, is also present; it could lead to an application crash (denial of service) when viewing such images. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | <=1.4.2 | |
Libp2p | <=1.2.43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-608238 is categorized as moderate.
To fix REDHAT-BUG-608238, update libpng to version 1.4.3 or later, or 1.2.44 or later for older versions.
REDHAT-BUG-608238 affects libpng versions up to and including 1.4.2 and versions up to 1.2.43 in the older series.
Progressive applications such as web browsers and the rpng2 demo app are impacted by REDHAT-BUG-608238.
Yes, REDHAT-BUG-608238 can lead to vulnerabilities that may be exploited through malformed PNG files.