Update of /export/home/ntop/gdchart0.94c/gd-1.8.3/libpng-1.2.4/projects/borland
In directory jabber:/tmp/cvs-serv27300

Added Files:
        libpng.bpf libpng.bpg libpng.bpr libpng.cpp libpng.readme.txt 
        libpngstat.bpf libpngstat.bpr zlib+libpng.bpg zlib.bpf 
        zlib.bpg zlib.bpr zlib.cpp zlibstat.bpf zlibstat.bpr 
Log Message:
Move ntop (2.1.50+) to libpng 1.2.4 (http://www.libpng.org/pub/png/libpng.html)

This version fixes a recently reported security problem, albeit one
that ntop does not appear to be vulnerable to.

 The 1.2.4* and 1.0.14 releases of libpng solve a potential buffer
 overflow vulnerability[1] in some functions related to progressive
 image loading. Programs such as mozilla and various others use these
 functions. An attacker could exploit this to remotely run arbitrary
 code or crash an application by using a specially crafted png image.

I.e. ntop could create a bad png and crash, etc. the users browser.
If the browser is using the older, vulnerable libary, we could
run arbitrary code on the USERS machine.

But ntop itself isn't vulnerable to attack, that is a user, using 
libpng/ntop to escalate his/her privledge on the ntop host.

-----Burton



_______________________________________________
Ntop-dev mailing list
[EMAIL PROTECTED]
http://lists.ntop.org/mailman/listinfo/ntop-dev

Reply via email to