First published: Mon Jun 28 2010(Updated: )
A memory leak was found in the way libpng processed malformed Portable Network Graphics (PNG) images with Physical Scale (sCAL) extension. A remote attacker could create a specially-crafted PNG image and trick the local user into opening it in an application, using the libpng library, leading to denial of service (relevant libpng-based application crash). References: [1] <a href="http://www.libpng.org/pub/png/libpng.html">http://www.libpng.org/pub/png/libpng.html</a> CVE Request: [2] <a href="http://www.openwall.com/lists/oss-security/2010/06/28/2">http://www.openwall.com/lists/oss-security/2010/06/28/2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libpng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-608644 is considered high due to the potential for remote exploitation through a crafted PNG image.
To fix REDHAT-BUG-608644, update to the latest version of libpng that addresses the memory leak issue.
The potential impacts of REDHAT-BUG-608644 include application crashes and possible arbitrary code execution if a user opens a malicious PNG file.
REDHAT-BUG-608644 affects the libpng library used in applications that process PNG images.
Mitigation strategies for REDHAT-BUG-608644 include avoiding the opening of untrusted PNG files and applying the latest security updates for libpng.