http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363
    Portable Network Graphics (PNG) libraries (1) libpng 1.2.1 and
    earlier, and (2) libpng3 1.2.5 and earlier, do not correctly
    calculate offsets, which allows remote attackers to cause a denial
    of service (crash) and possibly execute arbitrary code via a buffer
    overflow attack on the row buffers.

                ****

OpenPKG
    png-1.2.0-1.0.0
    png-1.2.4-1.1.0
    png-1.2.5-20021003

                ****

http://www.debian.org/security/2002/dsa-213
    Glenn Randers-Pehrson discovered a problem in connection with 16-bit
    samples from libpng, an interface for reading and writing PNG
    (Portable Network Graphics) format files. The starting offsets for
    the loops are calculated incorrectly which causes a buffer overrun
    beyond the beginning of the row buffer.
[...]
    o current stable distribution (woody) [...] fixed in version
      1.0.12-3.woody.3 for libpng and in version 1.2.1-1.1.woody.3 for
      libpng3.
    o For the old stable distribution (potato) this problem has been
      fixed in version 1.0.5-1.1 for libpng.
    o For the unstable distribution (sid) this problem has been fixed in
      version 1.0.12-7 for libpng and in version 1.2.5-8 for libpng3.

                ****

http://www.redhat.com/support/errata/RHSA-2003-006.html
    Unpatched versions of libpng 1.2.1 and earlier do not correctly
    calculate offsets
[...]
    o For Red Hat Linux 8.0 the packages contain libpng 1.2.2 which is
      not vulnerable to this issue
    o For Red Hat Linux 6.2, 7, 7.1, 7.2 and 7.3 the packages contain
      libpng 1.0.14 with a backported patch that corrects this issue.

--
[EMAIL PROTECTED]
Development Team, Application Services, Cable & Wireless Deutschland GmbH
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
Developer Communication List                   [EMAIL PROTECTED]

Reply via email to