Description: | Description: The remote host is missing an update to libpng10 announced via advisory FEDORA-2011-8844.
Update Information:
This update fixes a 1-byte uninitialized memory reference in png_format_buffer(). It allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message. This is CVE-2011-2501.
Also fixed in this release are some other minor security problems and there's additionally a bugfix backported from 1.5.3: when expanding a paletted image, always expand to RGBA if transparency is present.
References:
[ 1 ] Bug #717084 - CVE-2011-2501 libpng: regression of CVE-2004-0421 in 1.2.23+ https://bugzilla.redhat.com/show_bug.cgi?id=717084 [ 2 ] Bug #720607 - CVE-2011-2690 libpng: buffer overwrite in png_rgb_to_gray https://bugzilla.redhat.com/show_bug.cgi?id=720607 [ 3 ] Bug #720612 - CVE-2011-2692 libpng: Memory corruption when handling empty sCAL chunks https://bugzilla.redhat.com/show_bug.cgi?id=720612 [ 4 ] Bug #720608 - CVE-2011-2691 libpng: Crash in png_default_error due to use of NULL Pointer https://bugzilla.redhat.com/show_bug.cgi?id=720608
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update libpng10' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-8844
Risk factor : High
CVSS Score: 6.8
|