http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363
Portable Network Graphics (PNG) libraries (1) libpng 1.2.1 and
earlier, and (2) libpng3 1.2.5 and earlier, do not correctly
calculate offsets, which allows remote attackers to cause a denial
of service (crash) and possibly execute arbitrary code via a buffer
overflow attack on the row buffers.
****
OpenPKG
png-1.2.0-1.0.0
png-1.2.4-1.1.0
png-1.2.5-20021003
****
http://www.debian.org/security/2002/dsa-213
Glenn Randers-Pehrson discovered a problem in connection with 16-bit
samples from libpng, an interface for reading and writing PNG
(Portable Network Graphics) format files. The starting offsets for
the loops are calculated incorrectly which causes a buffer overrun
beyond the beginning of the row buffer.
[...]
o current stable distribution (woody) [...] fixed in version
1.0.12-3.woody.3 for libpng and in version 1.2.1-1.1.woody.3 for
libpng3.
o For the old stable distribution (potato) this problem has been
fixed in version 1.0.5-1.1 for libpng.
o For the unstable distribution (sid) this problem has been fixed in
version 1.0.12-7 for libpng and in version 1.2.5-8 for libpng3.
****
http://www.redhat.com/support/errata/RHSA-2003-006.html
Unpatched versions of libpng 1.2.1 and earlier do not correctly
calculate offsets
[...]
o For Red Hat Linux 8.0 the packages contain libpng 1.2.2 which is
not vulnerable to this issue
o For Red Hat Linux 6.2, 7, 7.1, 7.2 and 7.3 the packages contain
libpng 1.0.14 with a backported patch that corrects this issue.
--
[EMAIL PROTECTED]
Development Team, Application Services, Cable & Wireless Deutschland GmbH
______________________________________________________________________
The OpenPKG Project www.openpkg.org
Developer Communication List [EMAIL PROTECTED]