SynopsisThe remote Fedora host is missing a security update.
DescriptionCertain chunk handlers in libpng10 before 1.0.29 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
http://secunia.com/advisories/27093 http://www.frsirt.com/english/advisories/2007/3390 http://sourceforge.net/mailarchive/forum.php?thread_name=126.96.36.199.2007 1004082318.012a7628%40mail.comcast.net&forum_name=png-mng-implement
This update to 1.0.29 addresses these issues.
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected libpng10, libpng10-debuginfo and / or libpng10-devel packages.