First published: Tue Jul 12 2011(Updated: )
It was found that libpng read uninitialized memory when it encountered a sCAL chunk that is empty, and improperly handles a sCAL chunk that lacks the terminating zero between the two strings that it conveys. This was fixed in libpng-1.5.4, libpng-1.4.8, libpng-1.2.45, and libpng-1.0.55. Patch: <a href="http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339">http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=61a2d8a2a7b03023e63eae9a3e64607aaaa6d339</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | <1.5.4 | |
Libp2p | <1.4.8 | |
Libp2p | <1.2.45 | |
Libp2p | <1.0.55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-720612 is categorized as a medium-risk vulnerability due to the potential for unintended information disclosure.
To fix REDHAT-BUG-720612, you should upgrade to libpng versions 1.5.4, 1.4.8, 1.2.45, or 1.0.55, which contain the necessary patches.
The potential impacts of REDHAT-BUG-720612 include the reading of uninitialized memory, which may lead to information leakage.
Affected versions of libpng include all versions prior to 1.5.4, 1.4.8, 1.2.45, and 1.0.55.
As of now, there is no widely reported exploit for REDHAT-BUG-720612, but the vulnerability itself could be exploited in specific circumstances.