First published: Thu Mar 01 2012(Updated: )
A type conversion flaw leading to an out-of-bounds heap buffer read was found in the way libpng, a library of functions for manipulation PNG image format files, performed expansion of certain iCCP, iTXt, and zTXt PNG image file chunks. A remote attacker could provide a specially-crafted Portable Network Graphics (PNG) image file, which once opened in an application, linked against libpng, could lead to denial of service or in some cases, execution of arbitrary code with permission of the user running such an application. Upstream patch: <a href="http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b#patch3">http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commitdiff;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b#patch3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-799000 is classified as moderate due to the potential for an out-of-bounds heap buffer read.
To fix REDHAT-BUG-799000, update to the latest version of libpng that has addressed the vulnerability.
Users and systems utilizing vulnerable versions of libpng are at risk of being affected by REDHAT-BUG-799000.
A remote attacker can exploit REDHAT-BUG-799000 by providing specially-crafted PNG files to trigger the vulnerability.
As of now, there is no publicly known exploit specifically targeting REDHAT-BUG-799000.