|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for libpng CESA-2012:0317 centos4|
|Summary:||The remote host is missing an update for the 'libpng'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'libpng'
package(s) announced via the referenced advisory.
The libpng packages contain a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files.
A heap-based buffer overflow flaw was found in libpng. An attacker could
create a specially-crafted PNG image that, when opened, could cause an
application using libpng to crash or, possibly, execute arbitrary code with
the privileges of the user running the application. (CVE-2011-3026)
Users of libpng and libpng10 should upgrade to these updated packages,
which contain a backported patch to correct this issue. All running
applications using libpng or libpng10 must be restarted for the update to
libpng on CentOS 4
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3026|
SuSE Security Announcement: SUSE-SU-2012:0303 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0297 (Google Search)
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.