The Portable Network Graphics library (libpng) contains a flaw that could introduce a remotely exploitable vulnerability.
The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng reference library is available for application developers to support the PNG image format.
A potential integer overflow error exists during a memory allocation within the png_handle_sPLT() function. While the code that contains this error introduces a dangerous condition, it is unclear what practical vulnerabilities it might present in applications using libpng.
The complete impact of this vulnerability is not yet known.
Apply a patch from the vendor
Apple Computer Inc. Affected
Trustix Secure Linux Affected
Juniper Networks Not Affected
NEC Corporation Not Affected
Cray Inc. Unknown
Hewlett-Packard Company Unknown
IBM eServer Unknown
Ingrian Networks Unknown
Microsoft Corporation Unknown
MontaVista Software Unknown
Openwall GNU/*/Linux Unknown
Red Hat Inc. Unknown
Sony Corporation Unknown
SuSE Inc. Unknown
Sun Microsystems Inc. Unknown
Wind River Systems Inc. Unknown
eMC Corporation Unknown
Thanks to Chris Evans for reporting this vulnerability.
This document was written by Chad Dougherty and Damon Morda.
|Date First Published:||2004-08-04|
|Date Last Updated:||2005-06-01 20:45 UTC|