Debian DSA-536-1 : libpng - several vulnerabilities

Critical Nessus Plugin ID 15373

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.4


The remote Debian host is missing a security-related update.


Chris Evans discovered several vulnerabilities in libpng :

- CAN-2004-0597 Multiple buffer overflows exist, including when handling transparency chunk data, which could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed

- CAN-2004-0598

Multiple NULL pointer dereferences in png_handle_iCPP() and elsewhere could be exploited to cause an application to crash when a specially crafted PNG image is processed

- CAN-2004-0599

Multiple integer overflows in the png_handle_sPLT(), png_read_png() functions and elsewhere could be exploited to cause an application to crash, or potentially arbitrary code to be executed, when a specially crafted PNG image is processed

In addition, a bug related to CAN-2002-1363 was fixed :

- CAN-2004-0768

A buffer overflow could be caused by incorrect calculation of buffer offsets, possibly leading to the execution of arbitrary code


For the current stable distribution (woody), these problems have been fixed in libpng3 version 1.2.1-1.1.woody.7 and libpng version 1.0.12-3.woody.7.

We recommend that you update your libpng and libpng3 packages.

See Also

Plugin Details

Severity: Critical

ID: 15373

File Name: debian_DSA-536.nasl

Version: 1.24

Type: local

Agent: unix

Published: 2004/09/29

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 9.4

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libpng, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2004/08/04

Vulnerability Publication Date: 2004/08/04

Reference Information

CVE: CVE-2004-0597, CVE-2004-0598, CVE-2004-0599, CVE-2004-0768

CERT: 160448, 236656, 286464, 388984, 477512, 817368

DSA: 536