CentOS 3 : libpng (CESA-2009:0340)

medium Nessus Plugin ID 35768

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated libpng and libpng10 packages that fix a security issue are now available for Red Hat Enterprise Linux 3.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files.

A flaw was discovered in libpng that could result in libpng trying to free() random memory if certain, unlikely error conditions occurred.
If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040)

Users of libpng and libpng10 should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using libpng or libpng10 must be restarted for the update to take effect.

Solution

Update the affected libpng packages.

See Also

http://www.nessus.org/u?c4ddbfca

http://www.nessus.org/u?8abbd182

http://www.nessus.org/u?915ce5ce

Plugin Details

Severity: Medium

ID: 35768

File Name: centos_RHSA-2009-0340.nasl

Version: 1.14

Type: local

Agent: unix

Published: 3/5/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:libpng, p-cpe:/a:centos:centos:libpng-devel, p-cpe:/a:centos:centos:libpng10, p-cpe:/a:centos:centos:libpng10-devel, cpe:/o:centos:centos:3

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/4/2009

Vulnerability Publication Date: 2/22/2009

Reference Information

CVE: CVE-2009-0040

BID: 33827

CWE: 94

RHSA: 2009:0340