|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for libpng RHSA-2012:0317-01|
|Summary:||The remote host is missing an update for the 'libpng'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'libpng'
package(s) announced via the referenced advisory.
The libpng packages contain a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files.
A heap-based buffer overflow flaw was found in libpng. An attacker could
create a specially-crafted PNG image that, when opened, could cause an
application using libpng to crash or, possibly, execute arbitrary code with
the privileges of the user running the application. (CVE-2011-3026)
Users of libpng and libpng10 should upgrade to these updated packages,
which contain a backported patch to correct this issue. All running
applications using libpng or libpng10 must be restarted for the update to
libpng on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3026|
SuSE Security Announcement: SUSE-SU-2012:0303 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0297 (Google Search)
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.