Package: libpng
Severity: grave
Version: 1.2.8rel-7
Tags: security

At http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
it reads:

  Name: CVE-2006-3334 (under review)
  Status: Candidate
  Description: Buffer overflow in the png_decompress_chunk
  function in pngrutil.c in libpng before 1.2.12 allows
  context-dependent attackers to cause a denial of service
  and possibly execute arbitrary code via unspecified vectors
  related to "chunk error processing," possibly involving the
  "chunk_name".

At http://www.libpng.org/pub/png/libpng.html it reads:

  Versions up through 1.2.11 and 1.0.19 have a buffer-overrun
  vulnerability when a particular error message is triggered.
  The overrun is always by exactly two bytes ('k' and NULL)
  so it seems highly unlikely that it could be used for
  anything more nefarious than denial of service (e.g.,
  crashing your browser when you visit a site displaying a
  specially crafted PNG). Nevertheless, it's worth fixing,
  and versions libpng 1.2.12 and libpng 1.0.20, released 27
  June 2006, do just that. (Note that 1.2.11 and 1.0.19
  erroneously claimed to include the fix, but in fact it had
  been inadvertently omitted.)

  The same releases (and their immediate predecessors) also
  fix an out-of-bounds (by one) memory read and a second
  buffer overrun, this one in the code that writes the sCAL
  chunk (which is rather rare in any case).

Aníbal Monsalve Salazar
--
http://v7w.com/anibal

Attachment: signature.asc
Description: Digital signature

Reply via email to