The libpng library contains an integer overflow vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng reference library is available for application developers to support the PNG image format.
The libpng library contains an integer overflow in the png_decompress_chunk() function, which can result in a buffer overflow.
By causing libpng to process a specially-crafted PNG file (e.g. by visiting a web page, viewing an email, or opening a document), a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the application that uses libpng.
Apply an update
Thanks to Jüri Aedla for reporting this vulnerability to the Google Chrome team.
|Date First Published:||2012-02-23|
|Date Last Updated:||2012-03-02 22:24 UTC|