search menu icon-carat-right cmu-wordmark

CERT Coordination Center


libpng denial of service vulnerability

Vulnerability Note VU#684664

Original Release Date: 2007-05-16 | Last Revised: 2007-08-23

Overview

The libpng library contains a denial-of-service vulnerability.

Description

The libpng library can be used to allow other applications to render PNG images.

The libpng library contains a denial-of-service vulnerability.

From the Libpng-1.2.16-ADVISORY:
This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.

The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[ ] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.

    An attacker may be able to exploit this vulnerability by convincing a user to open a specially crafted PNG image. The malicious image may be hosted on a website, or sent as an email attachment.

    Impact

    A remote, unauthenticated attacker may be able to create a denial-of-service condition.

    Solution

    Upgrade
    The libpng team has released a patch for libpng 1.0.25 and 1.2.17 to address this vulnerability. Administrators are encouraged to upgrade as soon as possible. Administrators who receive the libpng library from their operating system vendor should see the systems affected portion of this document for a list of affected vendors.

    Vendor Information

    684664
    Expand all

    Debian GNU/Linux

    Notified:  May 08, 2007 Updated:  June 08, 2007

    Status

      Vulnerable

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=424729 for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Gentoo Linux

    Notified:  May 08, 2007 Updated:  June 08, 2007

    Status

      Vulnerable

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://security.gentoo.org/glsa/glsa-200705-24.xml for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Mandriva, Inc.

    Notified:  May 08, 2007 Updated:  June 08, 2007

    Status

      Vulnerable

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Red Hat, Inc.

    Notified:  May 08, 2007 Updated:  May 18, 2007

    Status

      Vulnerable

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://rhn.redhat.com/errata/RHSA-2007-0356.html for more detais.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    SUSE Linux

    Notified:  May 08, 2007 Updated:  July 13, 2007

    Status

      Vulnerable

    Vendor Statement

    We have released fixed packages for this problem and issued a notice in http://www.novell.com/linux/security/advisories/2007_13_sr.html

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Sun Microsystems, Inc.

    Notified:  May 08, 2007 Updated:  August 22, 2007

    Status

      Vulnerable

    Vendor Statement

    Sun can confirm that Solaris 8, 9, and 10 are affected by the issue described in CERT advisory VU#684664

    Sun has published Sun Alert 102987 which includes details of the Solaris specific impact, contributing factors, workaround options and resolution information, and is available here:

    http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1

    The Sun Alert will be kept up to date regarding progress on this issue.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Ubuntu

    Notified:  May 08, 2007 Updated:  June 13, 2007

    Status

      Vulnerable

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    libpng

    Notified:  May 07, 2007 Updated:  May 16, 2007

    Status

      Vulnerable

    Vendor Statement

    A grayscale PNG image with a malformed (bad CRC) tRNS chunk will crash some libpng applications.

    This vulnerability could be used to crash a browser when a user tries to view such a malformed PNG file. It is not known whether the vulnerability could be exploited otherwise.

    The reason is that png_ptr->num_trans is set to 1 and then there is an error return after checking the CRC, so the trans[] array is never allocated. Since png_ptr->num_trans is nonzero, libpng tries to use the array later.

    This bug was first introduced in libpng version 0.90, in 1996. All versions from libpng-0.90 through libpng-1.2.16 are vulnerable.

    Here is the fix, thanks to Mats Palmgren:

    --- pngrutil.c_1.2.16 2007-05-11 23:11:55.395466000 -0500
    +++ pngrutil.c 2007-05-14 04:37:32.101297000 -0500
    @@ -1314,7 +1314,10 @@
    }

    if (png_crc_finish(png_ptr, 0))
    + {
    + png_ptr->num_trans = 0;
    return;
    + }

    png_set_tRNS(png_ptr, info_ptr, readbuf, png_ptr->num_trans,
    &(png_ptr->trans_values));

    This patch can be applied to any vulnerable version of libpng.

    Libpng version 1.0.25 and 1.2.17, which are being released concurrently
    with this advisory, have been patched.

    This vulnerability has been assigned the identifiers
    CVE-2007-2445 and CERT VU#684664.

    Glenn Randers-Pehrson
    PNG Development Group

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    See http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt for more details.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Apple Computer, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Conectiva Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Cray Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    EMC, Inc. (formerly Data General Corporation)

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Engarde Secure Linux

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    F5 Networks, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Fedora Project

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    FreeBSD, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Fujitsu

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Hewlett-Packard Company

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Hitachi

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    IBM Corporation

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    IBM Corporation (zseries)

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    IBM eServer

    Notified:  May 08, 2007 Updated:  May 23, 2007

    Status

      Unknown

    Vendor Statement

    For information related to this and other published CERT Advisories that may relate to the IBM eServer Platforms (xSeries, iSeries, pSeries, and zSeries) please go to

    https://app-06.www.ibm.com/servers/resourcelink/lib03020.nsf/pages/securityalerts?OpenDocument&pathID=

    In order to access this information you will require a Resource Link ID. To subscribe to Resource Link go to http://app-06.www.ibm.com/servers/resourcelink and follow the steps for registration.

    All questions should be referred to servsec@us.ibm.com.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Immunix Communications, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Ingrian Networks, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Juniper Networks, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Microsoft Corporation

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    MontaVista Software, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Mozilla

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    NEC Corporation

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    NetBSD

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Nokia

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Novell, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    OpenBSD

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Openwall GNU/*/Linux

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    QNX, Software Systems, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Silicon Graphics, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Slackware Linux Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Sony Corporation

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    The SCO Group

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Trustix Secure Linux

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Turbolinux

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Unisys

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Wind River Systems, Inc.

    Notified:  May 08, 2007 Updated:  May 08, 2007

    Status

      Unknown

    Vendor Statement

    No statement is currently available from the vendor regarding this vulnerability.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.


    CVSS Metrics

    Group Score Vector
    Base N/A N/A
    Temporal N/A N/A
    Environmental N/A

    References

    Credit

    Thanks to the libpng team for information that was used in this report.

    This document was written by Ryan Giobbi.

    Other Information

    CVE IDs: CVE-2007-2445
    Severity Metric: 3.86
    Date Public: 2007-05-16
    Date First Published: 2007-05-16
    Date Last Updated: 2007-08-23 01:06 UTC
    Document Revision: 21

    Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.