New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 9.4
SynopsisThe remote Debian host is missing a security-related update.
DescriptionChris Evans discovered several vulnerabilities in libpng :
- CAN-2004-0597 Multiple buffer overflows exist, including when handling transparency chunk data, which could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed
Multiple NULL pointer dereferences in png_handle_iCPP() and elsewhere could be exploited to cause an application to crash when a specially crafted PNG image is processed
Multiple integer overflows in the png_handle_sPLT(), png_read_png() functions and elsewhere could be exploited to cause an application to crash, or potentially arbitrary code to be executed, when a specially crafted PNG image is processed
In addition, a bug related to CAN-2002-1363 was fixed :
A buffer overflow could be caused by incorrect calculation of buffer offsets, possibly leading to the execution of arbitrary code
SolutionFor the current stable distribution (woody), these problems have been fixed in libpng3 version 1.2.1-1.1.woody.7 and libpng version 1.0.12-3.woody.7.
We recommend that you update your libpng and libpng3 packages.