Mandrake Linux Security Advisory : libpng (MDKSA-2004:063)

high Nessus Plugin ID 14162

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A buffer overflow vulnerability was discovered in libpng due to a wrong calculation of some loop offset values. This buffer overflow can lead to Denial of Service or even remote compromise.

This vulnerability was initially patched in January of 2003, but it has since been noted that fixes were required in two additional places that had not been corrected with the earlier patch. This update uses an updated patch to fix all known issues.

After the upgrade, all applications that use libpng should be restarted. Many applications are linked to libpng, so if you are unsure of what applications to restart, you may wish to reboot the system. Mandrakesoft encourages all users to upgrade immediately.

Solution

Update the affected packages.

See Also

http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:008

Plugin Details

Severity: High

ID: 14162

File Name: mandrake_MDKSA-2004-063.nasl

Version: 1.17

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64png3, p-cpe:/a:mandriva:linux:lib64png3-devel, p-cpe:/a:mandriva:linux:lib64png3-static-devel, p-cpe:/a:mandriva:linux:libpng3, p-cpe:/a:mandriva:linux:libpng3-devel, p-cpe:/a:mandriva:linux:libpng3-static-devel, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 6/29/2004

Reference Information

CVE: CVE-2002-1363

MDKSA: 2004:063