This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
A type conversion flaw leading to an out-of-bounds heap buffer read
was found in the way libpng10, a library of functions for manipulation
PNG image format files, performed expansion of certain iCCP, iTXt, and
zTXt PNG image file chunks.
A remote attacker could provide a specially crafted Portable Network
Graphics (PNG) image file, which once opened in an application, linked
against libpng10, could lead to denial of service or in some cases,
execution of arbitrary code without permission of the user running
such an application.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected libpng10 package.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false