Sicherheit: Pufferüberlauf in libpng10
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in libpng10
ID: FEDORA-2012-3507
Distribution: Fedora
Plattformen: Fedora 17
Datum: Di, 13. März 2012, 22:18
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045
Applikationen: libpng


Name        : libpng10
Product : Fedora 17
Version : 1.0.58
Release : 1.fc17
URL : http://www.libpng.org/pub/png/libpng.html
Summary : Old version of libpng, needed to run old binaries
Description :
The libpng10 package contains an old version of libpng, a library of functions
for creating and manipulating PNG (Portable Network Graphics) image format

This package is needed if you want to run binaries that were linked dynamically
with libpng 1.0.x.

Update Information:

A type conversion flaw leading to an out-of-bounds heap buffer read was found
in the way libpng10, a library of functions for manipulation PNG image format files, performed expansion of certain iCCP, iTXt, and zTXt PNG image file chunks.

A remote attacker could provide a specially-crafted Portable Network Graphics
(PNG) image file, which once opened in an application, linked against libpng10, could lead to denial of service or in some cases, execution of arbitrary code without permission of the user running such an application.

[ 1 ] Bug #799000 - CVE-2011-3045 libpng: buffer overflow in png_inflate
caused by invalid type conversions

This update can be installed with the "yum" update program. Use
su -c 'yum update libpng10' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Traut euch!
Neue Nachrichten