Vulnerability Note VU#286464
libpng contains integer overflows in progressive display image reading
The Portable Network Graphics library (libpng) contains several flaws in progressive image handling that could introduce a remotely exploitable vulnerability.
The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng reference library is available for application developers to support the PNG image format.
The libpng library features the ability to display interlaced, or progressive display, PNG files or streams. A number of potential integer overflow errors exist in libpng's handling of such progressive display images. While the code that contains these errors introduces dangerous conditions, it is unclear what practical vulnerabilities it might present in applications using libpng.
The complete impact of this vulnerability is not yet known.
Apply a patch from the vendor
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||16 Jul 2004||01 Jun 2005|
|Gentoo||Affected||-||20 Aug 2004|
|libpng.org||Affected||16 Jul 2004||04 Aug 2004|
|OpenPKG||Affected||-||20 Aug 2004|
|Slackware||Affected||-||20 Aug 2004|
|Trustix Secure Linux||Affected||-||20 Aug 2004|
|Juniper Networks||Not Affected||16 Jul 2004||23 Jul 2004|
|NEC Corporation||Not Affected||16 Jul 2004||03 Aug 2004|
|BSDI||Unknown||-||23 Jul 2004|
|Conectiva||Unknown||-||23 Jul 2004|
|Cray Inc.||Unknown||-||23 Jul 2004|
|Debian||Unknown||-||23 Jul 2004|
|eMC Corporation||Unknown||-||23 Jul 2004|
|Engarde||Unknown||-||23 Jul 2004|
|FreeBSD||Unknown||-||23 Jul 2004|
CVSS Metrics (Learn More)
Thanks to Chris Evans for reporting this vulnerability.
This document was written by Chad Dougherty and Damon Morda.
- CVE IDs: CAN-2004-0599
- Date Public: 04 Aug 2004
- Date First Published: 04 Aug 2004
- Date Last Updated: 01 Jun 2005
- Severity Metric: 0.97
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.