This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated libpng packages are available that fix a buffer overflow
The libpng package contains a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files. PNG
is a bit-mapped graphics format similar to the GIF format.
Versions of libpng prior to 1.0.14 contain a buffer overflow in the
progressive reader when the PNG datastream contains more IDAT data
than indicated by the IHDR chunk. Such deliberately malformed
datastreams would crash applications linked to libpng such as Mozilla
that use the progressive reading feature.
Packages within Red Hat Linux Advanced Server , such as Mozilla, make
use of the shared libpng library, therefore all users are advised to
upgrade to the errata packages which contain libpng 1.0.14. Libpng
1.0.14 is not vulnerable to this issue and contains fixes for other
bugs including a number of memory leaks.
See also :
Update the affected libpng and / or libpng-devel packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12313 ()
CVE ID: CVE-2002-0660CVE-2002-0728
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.