Vulnerability Note VU#160448
libpng integer overflow in image height processing
The Portable Network Graphics library (libpng) contains a remotely exploitable vulnerability which could cause affected applications to crash.
The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng reference library is available for application developers to support the PNG image format.
An integer overflow error exists in the handling of PNG image height within the png_read_png() function. As a result, a PNG image with excessive height may cause an integer overflow on a memory allocation and could cause the affected application to crash.
An attacker could cause a vulnerable application to crash by supplying a specially-crafted PNG image. Vulnerable applications that read images from network sources could be exploited remotely.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||16 Jul 2004||04 Aug 2004|
|libpng.org||Affected||16 Jul 2004||04 Aug 2004|
|MontaVista Software||Affected||16 Jul 2004||04 Aug 2004|
|IBM||Not Affected||16 Jul 2004||04 Aug 2004|
|Juniper Networks||Not Affected||16 Jul 2004||23 Jul 2004|
|NEC Corporation||Not Affected||16 Jul 2004||03 Aug 2004|
|BSDI||Unknown||-||23 Jul 2004|
|Conectiva||Unknown||-||23 Jul 2004|
|Cray Inc.||Unknown||-||23 Jul 2004|
|Debian||Unknown||-||23 Jul 2004|
|eMC Corporation||Unknown||-||23 Jul 2004|
|Engarde||Unknown||-||23 Jul 2004|
|FreeBSD||Unknown||-||23 Jul 2004|
|Fujitsu||Unknown||-||23 Jul 2004|
|Hewlett-Packard Company||Unknown||-||23 Jul 2004|
CVSS Metrics (Learn More)
Thanks to Chris Evans for reporting this vulnerability.
This document was written by Chad Dougherty and Damon Morda.
- CVE IDs: CAN-2004-0599
- Date Public: 04 Aug 2004
- Date First Published: 04 Aug 2004
- Date Last Updated: 04 Aug 2004
- Severity Metric: 0.97
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.