Mandrake Linux Security Advisory : libpng (MDKSA-2004:063)

High Nessus Plugin ID 14162


The remote Mandrake Linux host is missing one or more security updates.


A buffer overflow vulnerability was discovered in libpng due to a wrong calculation of some loop offset values. This buffer overflow can lead to Denial of Service or even remote compromise.

This vulnerability was initially patched in January of 2003, but it has since been noted that fixes were required in two additional places that had not been corrected with the earlier patch. This update uses an updated patch to fix all known issues.

After the upgrade, all applications that use libpng should be restarted. Many applications are linked to libpng, so if you are unsure of what applications to restart, you may wish to reboot the system. Mandrakesoft encourages all users to upgrade immediately.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 14162

File Name: mandrake_MDKSA-2004-063.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2004/07/31

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64png3, p-cpe:/a:mandriva:linux:lib64png3-devel, p-cpe:/a:mandriva:linux:lib64png3-static-devel, p-cpe:/a:mandriva:linux:libpng3, p-cpe:/a:mandriva:linux:libpng3-devel, p-cpe:/a:mandriva:linux:libpng3-static-devel, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2004/06/29

Reference Information

CVE: CVE-2002-1363

MDKSA: 2004:063