SB2011062904 - Fedora EPEL 6 update for libpng10



SB2011062904 - Fedora EPEL 6 update for libpng10

Published: June 29, 2011 Updated: April 24, 2025

Security Bulletin ID SB2011062904
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 40% Medium 40% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2011-2501)

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data. NOTE: this vulnerability exists because of a CVE-2004-0421 regression.


2) Out-of-bounds read (CVE-ID: CVE-2004-0421)

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PNG file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.


3) Buffer overflow (CVE-ID: CVE-2011-2690)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.


4) NULL pointer dereference (CVE-ID: CVE-2011-2691)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.


5) Buffer overflow (CVE-ID: CVE-2011-2692)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.


Remediation

Install update from vendor's website.