![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.900071 |
Category: | General |
Title: | libpng pngwutil.c NULL pointer Vulnerability |
Summary: | libpng is prone to a memory overwrite vulnerability. |
Description: | Summary: libpng is prone to a memory overwrite vulnerability. Vulnerability Insight: Attackers can set the value of arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer. Vulnerability Impact: Successful remote exploitation could result in arbitrary code execution on the affected system. Affected Software/OS: libpng 1.0.41 and prior and 1.2.x to 1.2.33 on Linux. Solution: Upgrade to libpng 1.0.42 or 1.2.34. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5907 Debian Security Information: DSA-1750 (Google Search) http://www.debian.org/security/2009/dsa-1750 http://security.gentoo.org/glsa/glsa-200903-28.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:051 http://openwall.com/lists/oss-security/2009/01/09/1 http://sourceforge.net/mailarchive/forum.php?thread_name=4B6F0239C13D0245820603C036D180BC79FBAA%40CABOTUKEXCH01.cabot.local&forum_name=png-mng-implement http://secunia.com/advisories/34320 http://secunia.com/advisories/34388 SuSE Security Announcement: SUSE-SR:2009:003 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html XForce ISS Database: libpng-pngcheckkeyword-memory-corruption(48128) https://exchange.xforce.ibmcloud.com/vulnerabilities/48128 |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |