RHEL 2.1 : libpng (RHSA-2002:152)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated libpng packages are available that fix a buffer overflow
vulnerability.

The libpng package contains a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files. PNG
is a bit-mapped graphics format similar to the GIF format.

Versions of libpng prior to 1.0.14 contain a buffer overflow in the
progressive reader when the PNG datastream contains more IDAT data
than indicated by the IHDR chunk. Such deliberately malformed
datastreams would crash applications linked to libpng such as Mozilla
that use the progressive reading feature.

Packages within Red Hat Linux Advanced Server , such as Mozilla, make
use of the shared libpng library, therefore all users are advised to
upgrade to the errata packages which contain libpng 1.0.14. Libpng
1.0.14 is not vulnerable to this issue and contains fixes for other
bugs including a number of memory leaks.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-0660.html
https://www.redhat.com/security/data/cve/CVE-2002-0728.html
http://rhn.redhat.com/errata/RHSA-2002-152.html

Solution :

Update the affected libpng and / or libpng-devel packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12313 ()

Bugtraq ID:

CVE ID: CVE-2002-0660
CVE-2002-0728