Libpng "png_decompress_chunk()" Chunk Name Handling Buffer Overflow Vulnerability
Technical Description



A vulnerability has been identified in Libpng, which could be exploited by attackers to cause a denial of service or execute arbitrary commands. This flaw is due to a buffer overflow error in the "png_decompress_chunk()" [pngrutil.c] routine that does not validate the "chunk_name" before being copied into an insufficiently sized buffer, which could be exploited by attackers to crash an application linked against a vulnerable library or potentially execute arbitrary code via a specially crafted image.



Affected Products



Libpng versions prior to 1.0.20

Libpng versions prior to 1.2.12



Solution



Upgrade to Libpng version 1.0.20 or 1.2.12 :

http://sourceforge.net/projects/libpng/

더보기

댓글,