Description: | Description:
The remote host is missing updates announced in advisory FLSA-2005:1943.
During a source code audit, Chris Evans discovered several buffer overflows in libpng. An attacker could create a carefully crafted PNG file in such a way that it would cause an application linked with libpng to execute arbitrary code when the file was opened by a victim. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0597 to these issues.
In addition, this audit discovered a potential NULL pointer dereference in libpng (CVE-2004-0598) and several integer overflow issues (CVE-2004-0599). An attacker could create a carefully crafted PNG file in such a way that it would cause an application linked with libpng to crash when the file was opened by the victim.
These patches also include a more complete fix for the out of bounds memory access flaw (CVE-2002-1363), in which there was a buffer overrun while adding filler bytes to 16-bit RGBA samples, and a similar patch (CVE-2004-0768) that fixes a buffer overrun while adding filler bytes to 16-bit grayscale samples.
All users are advised to update to the updated libpng packages which contain backported security patches and are not vulnerable to these issues.
Affected platforms: Redhat 7.3 Redhat 9 Fedora Core 1
Solution: https://secure1.securityspace.com/smysecure/catid.html?in=FLSA-2005:1943
Risk factor : Critical
CVSS Score: 10.0
|