Computer Security
[EN] securityvulns.ru no-pyccku


libpng multiple security vulnerabilities
Published:25.02.2009
Source:
SecurityVulns ID:9691
Type:library
Threat Level:
6/10
Description:Few vulnerabilities potentially allow code execution on PNG parsing.
Affected:libpng : libpng 1.2
 libpng : libpng 1.0
CVE:CVE-2009-0040 (The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.)
 CVE-2008-5907 (The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. NOTE: some sources incorrectly report this as a double free vulnerability.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:051 ] libpng (25.02.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod