Mandrake Linux Security Advisory : pxelinux (MDKSA-2006:211)

high Nessus Plugin ID 24596


The remote Mandrake Linux host is missing one or more security updates.


PXELINUX is a PXE bootloader. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities :

Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to 'chunk error processing,' possibly involving the 'chunk_name'. (CVE-2006-3334)

It is questionable whether this issue is actually exploitable, but the patch to correct the issue has been included in versions < 1.2.12.

Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash. (CVE-2006-5793)

Packages have been patched to correct these issues.


Update the affected pxelinux and / or pxelinux-devel packages.

Plugin Details

Severity: High

ID: 24596

File Name: mandrake_MDKSA-2006-211.nasl

Version: 1.15

Type: local

Published: 2/18/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:pxelinux-devel, cpe:/o:mandriva:linux:2006, p-cpe:/a:mandriva:linux:pxelinux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/16/2006

Reference Information

CVE: CVE-2006-3334, CVE-2006-5793

BID: 18698, 21078

MDKSA: 2006:211