First published: Sat Oct 23 2004(Updated: )
Several integer overflow vulnerabilities were discovered in the PNG library. These vulnerabilities could be exploited by an attacker by providing a specially crafted PNG image which, when processed by the PNG library, could result in the execution of program code provided by the attacker. The PNG library is used by a variety of software packages for different purposes, so the exact nature of the exposure will vary depending on the software involved.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libpng10-0 | < | |
Ubuntu gir1.2-packagekitglib-1.0 | =4.10 | |
All of | ||
ubuntu/libpng12-dev | < | |
Ubuntu gir1.2-packagekitglib-1.0 | =4.10 | |
All of | ||
ubuntu/libpng12-0 | < | |
Ubuntu gir1.2-packagekitglib-1.0 | =4.10 | |
All of | ||
ubuntu/libpng10-dev | < | |
Ubuntu gir1.2-packagekitglib-1.0 | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The USN-1-1 vulnerability is rated as critical due to its potential to allow code execution via crafted PNG images.
To resolve the USN-1-1 vulnerability, update the affected libpng packages to the latest version provided by Ubuntu.
USN-1-1 affects Ubuntu version 4.10 with specific libpng packages such as libpng10-0 and libpng12-0.
USN-1-1 can be exploited by attackers by sending specially crafted PNG files that lead to integer overflow and potential code execution.
Yes, there have been reports of exploits leveraging the vulnerabilities in USN-1-1 to execute arbitrary code on affected systems.