SynopsisThe remote Mandrake Linux host is missing a security update.
DescriptionDoxygen is a documentation system for C, C++ and IDL. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities :
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to 'chunk error processing,' possibly involving the 'chunk_name'. (CVE-2006-3334)
It is questionable whether this issue is actually exploitable, but the patch to correct the issue has been included in versions < 1.2.12.
Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash. (CVE-2006-5793)
In addition, an patch to address several old vulnerabilities has been applied to this build. (CVE-2002-1363, CVE-2004-0421, CVE-2004-0597, CVE-2004-0598, CVE-2004-0599)
Packages have been patched to correct these issues.
SolutionUpdate the affected doxygen package.
File Name: mandrake_MDKSA-2006-212.nasl
Temporal Vector: E:POC/RL:OF/RC:C
CPE: p-cpe:/a:mandriva:linux:doxygen, cpe:/o:mandriva:linux:2006, cpe:/o:mandriva:linux:2007
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list
Exploit Ease: Exploits are available
Patch Publication Date: 11/16/2006