CVE-2006-3334
CVSS7.5
发布时间 :2006-06-30 19:05:00
修订时间 :2011-03-07 21:38:22
NMCOPS    

[原文]Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".


[CNNVD]LibPNG 图形库块错误处理 缓冲区溢出漏洞(CNNVD-200606-614)

        libpng是多种应用程序使用的解析PNG图象格式的库。
        libpng处理畸形有图像文件时存在漏洞,本地攻击者可能利用此漏洞诱使用户执行任意指令。
        本地或远程攻击者可以利用libpng在处理块错误时的缓冲区溢出导致执行任意指令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:greg_roelofs:libpng:1.2.6
cpe:/a:greg_roelofs:libpng:1.2.3
cpe:/a:greg_roelofs:libpng:1.2.2
cpe:/a:greg_roelofs:libpng:1.2.10
cpe:/a:greg_roelofs:libpng:1.2.9
cpe:/a:greg_roelofs:libpng:1.2.11
cpe:/a:greg_roelofs:libpng:1.2.0
cpe:/a:greg_roelofs:libpng:1.2.5
cpe:/a:greg_roelofs:libpng:1.2.7rc1
cpe:/a:greg_roelofs:libpng:1.2.8
cpe:/a:greg_roelofs:libpng:1.2.4
cpe:/a:greg_roelofs:libpng:1.2.1
cpe:/a:greg_roelofs:libpng:1.2.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3334
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-614
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2008/0924/references
(UNKNOWN)  VUPEN  ADV-2008-0924
http://www.vupen.com/english/advisories/2006/2585
(UNKNOWN)  VUPEN  ADV-2006-2585
http://www.securityfocus.com/bid/18698
(UNKNOWN)  BID  18698
http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=428123
(UNKNOWN)  CONFIRM  http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=428123
http://security.gentoo.org/glsa/glsa-200812-15.xml
(UNKNOWN)  GENTOO  GLSA-200812-15
http://secunia.com/advisories/33137
(UNKNOWN)  SECUNIA  33137
https://issues.rpath.com/browse/RPL-517
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-517
http://xforce.iss.net/xforce/xfdb/27468
(UNKNOWN)  XF  libpng-pngdecompresschunk-bo(27468)
http://www.securityfocus.com/archive/1/archive/1/440594/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060719 rPSA-2006-0133-1 libpng
http://www.novell.com/linux/security/advisories/2006_28_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:028
http://www.novell.com/linux/security/advisories/2006_16_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:016
http://www.mandriva.com/security/advisories?name=MDKSA-2006:213
(UNKNOWN)  MANDRIVA  MDKSA-2006:213
http://www.mandriva.com/security/advisories?name=MDKSA-2006:212
(UNKNOWN)  MANDRIVA  MDKSA-2006:212
http://www.mandriva.com/security/advisories?name=MDKSA-2006:211
(UNKNOWN)  MANDRIVA  MDKSA-2006:211
http://www.mandriva.com/security/advisories?name=MDKSA-2006:210
(UNKNOWN)  MANDRIVA  MDKSA-2006:210
http://www.mandriva.com/security/advisories?name=MDKSA-2006:209
(UNKNOWN)  MANDRIVA  MDKSA-2006:209
http://security.gentoo.org/glsa/glsa-200607-06.xml
(UNKNOWN)  GENTOO  GLSA-200607-06
http://secunia.com/advisories/29420
(UNKNOWN)  SECUNIA  29420
http://secunia.com/advisories/23335
(UNKNOWN)  SECUNIA  23335
http://secunia.com/advisories/22958
(UNKNOWN)  SECUNIA  22958
http://secunia.com/advisories/22957
(UNKNOWN)  SECUNIA  22957
http://secunia.com/advisories/22956
(UNKNOWN)  SECUNIA  22956
http://secunia.com/advisories/20960
(UNKNOWN)  SECUNIA  20960
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
(UNKNOWN)  APPLE  APPLE-SA-2008-03-18
http://docs.info.apple.com/article.html?artnum=307562
(UNKNOWN)  CONFIRM  http://docs.info.apple.com/article.html?artnum=307562

- 漏洞信息

LibPNG 图形库块错误处理 缓冲区溢出漏洞
高危 缓冲区溢出
2006-06-30 00:00:00 2009-01-23 00:00:00
远程※本地  
        libpng是多种应用程序使用的解析PNG图象格式的库。
        libpng处理畸形有图像文件时存在漏洞,本地攻击者可能利用此漏洞诱使用户执行任意指令。
        本地或远程攻击者可以利用libpng在处理块错误时的缓冲区溢出导致执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://prdownloads.sourceforge.net/libpng/libpng-1.2.12.tar.gz

- 漏洞信息 (F72968)

Gentoo Linux Security Advisory 200812-15 (PacketStormID:F72968)
2008-12-15 00:00:00
Gentoo  security.gentoo.org
advisory,arbitrary
linux,gentoo
CVE-2004-0768,CVE-2006-0481,CVE-2006-3334,CVE-2008-1382,CVE-2008-3964
[点击下载]

Gentoo Linux Security Advisory GLSA 200812-15 - POV-Ray includes a version of libpng that might allow for the execution of arbitrary code when reading a specially crafted PNG file POV-Ray uses a statically linked copy of libpng to view and output PNG files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964, CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in POV-Ray's build system caused it to load the old version when your installed copy of libpng was >=media-libs/libpng-1.2.10. Versions less than 3.6.1-r4 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200812-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                              http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
       Title: POV-Ray: User-assisted execution of arbitrary code
        Date: December 14, 2008
        Bugs: #153538
          ID: 200812-15

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

POV-Ray includes a version of libpng that might allow for the execution
of arbitrary code when reading a specially crafted PNG file

Background
==========

POV-Ray is a well known open-source ray tracer.

Affected packages
=================

      -------------------------------------------------------------------
       Package           /  Vulnerable  /                     Unaffected
      -------------------------------------------------------------------
    1  media-gfx/povray     < 3.6.1-r4                       >= 3.6.1-r4

Description
===========

POV-Ray uses a statically linked copy of libpng to view and output PNG
files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964,
CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in
POV-Ray's build system caused it to load the old version when your
installed copy of libpng was >=media-libs/libpng-1.2.10.

Impact
======

An attacker could entice a user to load a specially crafted PNG file as
a texture, resulting in the execution of arbitrary code with the
permissions of the user running the application.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All POV-Ray users should upgrade to the latest version:

      # emerge --sync
      # emerge --ask --oneshot --verbose ">=media-gfx/povray-3.6.1-r4"

References
==========

    [ 1 ] CVE-2004-0768
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0768
    [ 2 ] CVE-2006-0481
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0481
    [ 3 ] CVE-2006-3334
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
    [ 4 ] CVE-2008-1382
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382
    [ 5 ] CVE-2008-3964
          http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

    http://security.gentoo.org/glsa/glsa-200812-15.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


    

- 漏洞信息 (F52287)

Mandriva Linux Security Advisory 2006.213 (PacketStormID:F52287)
2006-11-18 00:00:00
Mandriva  mandriva.com
advisory,denial of service,overflow,arbitrary,vulnerability
linux,gentoo,mandriva
CVE-2006-3334,CVE-2006-5793
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-213 - Chromium is an OpenGL-based shoot them up game with fine graphics. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities. A buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:213
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : chromium
 Date    : November 16, 2006
 Affected: 2007.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Chromium is an OpenGL-based shoot them up game with fine graphics. It
 is built with a private copy of libpng, and as such could be
 susceptible to some of the same vulnerabilities:

 Buffer overflow in the png_decompress_chunk function in pngrutil.c in
 libpng before 1.2.12 allows context-dependent attackers to cause a
 denial of service and possibly execute arbitrary code via unspecified
 vectors related to "chunk error processing," possibly involving the
 "chunk_name". (CVE-2006-3334)

 It is questionable whether this issue is actually exploitable, but the
 patch to correct the issue has been included in versions < 1.2.12.

 In addition, an patch to address several old vulnerabilities has been
 applied to this build. (CAN-2002-1363, CAN-2004-0421, CAN-2004-0597,
 CAN-2004-0598, CAN-2004-0599)

 Packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 7d7fd24f8be5c881673c11ed7fdda1d0  2007.0/i586/chromium-0.9.12-25.1mdv2007.0.i586.rpm
 6175ab1df71466a69049dbda899c7c4b  2007.0/i586/chromium-setup-0.9.12-25.1mdv2007.0.i586.rpm 
 4dda1bbb70cce5cb6f1112995992ee1e  2007.0/SRPMS/chromium-0.9.12-25.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 c2b87550ef24da183d0fe78e850080b5  2007.0/x86_64/chromium-0.9.12-25.1mdv2007.0.x86_64.rpm
 91e024a81f7ff04e49f429259feaf4cd  2007.0/x86_64/chromium-setup-0.9.12-25.1mdv2007.0.x86_64.rpm 
 4dda1bbb70cce5cb6f1112995992ee1e  2007.0/SRPMS/chromium-0.9.12-25.1mdv2007.0.src.rpm

 Corporate 3.0:
 69ca9e0a4887c915bc283164b763b054  corporate/3.0/i586/chromium-0.9.12-21.1.C30mdk.i586.rpm
 4ca444ca9edb34229f0d1449f2e4d82f  corporate/3.0/i586/chromium-setup-0.9.12-21.1.C30mdk.i586.rpm 
 5007614bdfc283a0f5bb854955606ed1  corporate/3.0/SRPMS/chromium-0.9.12-21.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 96a4f2c6ba97c16d04f816656a88d674  corporate/3.0/x86_64/chromium-0.9.12-21.1.C30mdk.x86_64.rpm
 5b229452f499143e5d1dd73420d120aa  corporate/3.0/x86_64/chromium-setup-0.9.12-21.1.C30mdk.x86_64.rpm 
 5007614bdfc283a0f5bb854955606ed1  corporate/3.0/SRPMS/chromium-0.9.12-21.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFXMdZmqjQ0CJFipgRAn+MAKDbprCYkWVqDHH1ivaZLylt1jjxKwCeMhhY
92WG8JUMC6mrEwxfMCrOhEc=
=odb2
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F52286)

Mandriva Linux Security Advisory 2006.212 (PacketStormID:F52286)
2006-11-18 00:00:00
Mandriva  mandriva.com
advisory,denial of service,overflow,arbitrary,vulnerability
linux,gentoo,mandriva
CVE-2006-3334,CVE-2006-5793
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-212 - Doxygen is a documentation system for C, C++ and IDL. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities. A buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:212
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : doxygen
 Date    : November 16, 2006
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Doxygen is a documentation system for C, C++ and IDL. It is built with
 a private copy of libpng, and as such could be susceptible to some of
 the same vulnerabilities:

 Buffer overflow in the png_decompress_chunk function in pngrutil.c in
 libpng before 1.2.12 allows context-dependent attackers to cause a
 denial of service and possibly execute arbitrary code via unspecified
 vectors related to "chunk error processing," possibly involving the
 "chunk_name". (CVE-2006-3334)

 It is questionable whether this issue is actually exploitable, but the
 patch to correct the issue has been included in versions < 1.2.12.

 Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a
 typo in png_set_sPLT() that may cause an application using libpng to
 read out of bounds, resulting in a crash. (CVE-2006-5793)

 In addition, an patch to address several old vulnerabilities has been
 applied to this build. (CAN-2002-1363, CAN-2004-0421, CAN-2004-0597,
 CAN-2004-0598, CAN-2004-0599)

 Packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 f85fd4b73ca06136e4346df073851e5f  2006.0/i586/doxygen-1.4.4-1.1.20060mdk.i586.rpm 
 0842c1496bbb02b79d5cef3386b19380  2006.0/SRPMS/doxygen-1.4.4-1.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 fc3e569bd8ad2aa9aea76a6f4246cfec  2006.0/x86_64/doxygen-1.4.4-1.1.20060mdk.x86_64.rpm 
 0842c1496bbb02b79d5cef3386b19380  2006.0/SRPMS/doxygen-1.4.4-1.1.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 9d0af28627560057e6c80e64bbacf030  2007.0/i586/doxygen-1.4.7-1.1mdv2007.0.i586.rpm 
 f673aab0185f79a8aa048f69b06807bf  2007.0/SRPMS/doxygen-1.4.7-1.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 7fca6ebbe6f07e51de7fd771678277b4  2007.0/x86_64/doxygen-1.4.7-1.1mdv2007.0.x86_64.rpm 
 f673aab0185f79a8aa048f69b06807bf  2007.0/SRPMS/doxygen-1.4.7-1.1mdv2007.0.src.rpm

 Corporate 3.0:
 9452cede2d92671808eebe1adfc395ef  corporate/3.0/i586/doxygen-1.3.5-2.1.C30mdk.i586.rpm 
 9e84b6e12b77f43d123888b7ae05e5f4  corporate/3.0/SRPMS/doxygen-1.3.5-2.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 d988dc94c39515b3855116709bcc84de  corporate/3.0/x86_64/doxygen-1.3.5-2.1.C30mdk.x86_64.rpm 
 9e84b6e12b77f43d123888b7ae05e5f4  corporate/3.0/SRPMS/doxygen-1.3.5-2.1.C30mdk.src.rpm

 Corporate 4.0:
 a3b4702c81d1739249d59782efb316dc  corporate/4.0/i586/doxygen-1.4.4-1.1.20060mlcs4.i586.rpm 
 8223a356c6cf8a790dd20b3d70533f19  corporate/4.0/SRPMS/doxygen-1.4.4-1.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 0568b10460c651f18fd3e2a8e76b4300  corporate/4.0/x86_64/doxygen-1.4.4-1.1.20060mlcs4.x86_64.rpm 
 8223a356c6cf8a790dd20b3d70533f19  corporate/4.0/SRPMS/doxygen-1.4.4-1.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFXMIpmqjQ0CJFipgRAnt1AJ9NuzEsIC9PzHE278eZAhOPHjMh8QCePD/Q
pK8OJ2vhx3DqZ400EPH5QMw=
=R8Jo
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F52285)

Mandriva Linux Security Advisory 2006.211 (PacketStormID:F52285)
2006-11-18 00:00:00
Mandriva  mandriva.com
advisory,denial of service,overflow,arbitrary,vulnerability
linux,gentoo,mandriva
CVE-2006-3334,CVE-2006-5793
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-211 - PXELINUX is a PXE bootloader. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities. A buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:211
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : pxelinux
 Date    : November 16, 2006
 Affected: 2006.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 PXELINUX is a PXE bootloader.  It is built with a private copy of
 libpng, and as such could be susceptible to some of the same
 vulnerabilities:

 Buffer overflow in the png_decompress_chunk function in pngrutil.c in
 libpng before 1.2.12 allows context-dependent attackers to cause a
 denial of service and possibly execute arbitrary code via unspecified
 vectors related to "chunk error processing," possibly involving the
 "chunk_name". (CVE-2006-3334)

 It is questionable whether this issue is actually exploitable, but the
 patch to correct the issue has been included in versions < 1.2.12.

 Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a
 typo in png_set_sPLT() that may cause an application using libpng to
 read out of bounds, resulting in a crash. (CVE-2006-5793)

 Packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 0ea71d307e69d9edd950e75cabafd7c0  2006.0/i586/pxelinux-3.11-1.1.20060mdk.i586.rpm
 dff7ef13f57d61a451b77b00918e07cd  2006.0/i586/pxelinux-devel-3.11-1.1.20060mdk.i586.rpm 
 a9c531ff69efb2df50a8a00311181f65  2006.0/SRPMS/pxelinux-3.11-1.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 deec78c2bf5e26ff7d7aab58cf5a2fc5  2006.0/x86_64/pxelinux-3.11-1.1.20060mdk.i586.rpm
 52d33b5d03e87636fbda2e643dc60882  2006.0/x86_64/pxelinux-devel-3.11-1.1.20060mdk.i586.rpm 
 a9c531ff69efb2df50a8a00311181f65  2006.0/SRPMS/pxelinux-3.11-1.1.20060mdk.src.rpm

 Corporate 4.0:
 b0d3ea9fb11f47f5b60d35e511c069cf  corporate/4.0/i586/pxelinux-3.11-1.1.20060mlcs4.i586.rpm
 c34a3638a6042258306fa591a542f880  corporate/4.0/i586/pxelinux-devel-3.11-1.1.20060mlcs4.i586.rpm 
 68a203b1315849d3f690e2c5dd05b994  corporate/4.0/SRPMS/pxelinux-3.11-1.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 101bf5ce7b71092aa0d867475c71713b  corporate/4.0/x86_64/pxelinux-3.11-1.1.20060mlcs4.i586.rpm
 b8e512bf0b8ce91b64fad1a69735360c  corporate/4.0/x86_64/pxelinux-devel-3.11-1.1.20060mlcs4.i586.rpm 
 68a203b1315849d3f690e2c5dd05b994  corporate/4.0/SRPMS/pxelinux-3.11-1.1.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFXL3imqjQ0CJFipgRAkroAJ4sGm9q7SW0Br8gzdmubaNuOQoJ0gCfSf1K
rBftA0Q6CJxXrtfssMoX58E=
=u2z8
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F52284)

Mandriva Linux Security Advisory 2006.210 (PacketStormID:F52284)
2006-11-18 00:00:00
Mandriva  mandriva.com
advisory,denial of service,overflow,arbitrary,vulnerability
linux,windows,gentoo,mandriva
CVE-2006-3334,CVE-2006-5793
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-210 - SYSLINUX is a boot loader for the Linux operating system which operates off an MS-DOS/Windows FAT filesystem. It is built with a private copy of libpng, and as such could be susceptible to some of the same vulnerabilities. A buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:210
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : syslinux
 Date    : November 16, 2006
 Affected: 2007.0
 _______________________________________________________________________
 
 Problem Description:
 
 SYSLINUX is a boot loader for the Linux operating system which operates
 off an MS-DOS/Windows FAT filesystem. It is built with a private copy
 of libpng, and as such could be susceptible to some of the same
 vulnerabilities:

 Buffer overflow in the png_decompress_chunk function in pngrutil.c in
 libpng before 1.2.12 allows context-dependent attackers to cause a
 denial of service and possibly execute arbitrary code via unspecified
 vectors related to "chunk error processing," possibly involving the
 "chunk_name". (CVE-2006-3334)

 It is questionable whether this issue is actually exploitable, but the
 patch to correct the issue has been included in versions < 1.2.12.

 Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a
 typo in png_set_sPLT() that may cause an application using libpng to
 read out of bounds, resulting in a crash. (CVE-2006-5793)

 Packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 a2d0440a0b3a9c931479800703a2d60e  2007.0/i586/pxelinux-3.20-3.1mdv2007.0.i586.rpm
 1dcefe1c500d17ddc430c9990b202c2b  2007.0/i586/syslinux-3.20-3.1mdv2007.0.i586.rpm
 4c973128add1460edb19f4826a1bad7a  2007.0/i586/syslinux-devel-3.20-3.1mdv2007.0.i586.rpm 
 3893ea9327016ffbd67429924376378d  2007.0/SRPMS/syslinux-3.20-3.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 f8a364fb18e1a5a17d9112738925555c  2007.0/x86_64/pxelinux-3.20-3.1mdv2007.0.i586.rpm
 dc169368f3b24012fd34030a82de0367  2007.0/x86_64/syslinux-3.20-3.1mdv2007.0.i586.rpm
 e4ef6f30ce1ff80b91e21e883eff1d27  2007.0/x86_64/syslinux-devel-3.20-3.1mdv2007.0.i586.rpm 
 3893ea9327016ffbd67429924376378d  2007.0/SRPMS/syslinux-3.20-3.1mdv2007.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFXL0smqjQ0CJFipgRAqzxAJ0fyu38ObU0+wHBeH3kLfqQ6fhcawCguuCn
mZJ/xzQhnNYYezkK2W6pYqo=
=N+cq
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F52283)

Mandriva Linux Security Advisory 2006.209 (PacketStormID:F52283)
2006-11-18 00:00:00
Mandriva  mandriva.com
advisory,denial of service,overflow,arbitrary
linux,gentoo,mandriva
CVE-2006-3334,CVE-2006-5793
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-209 - A buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name". Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a typo in png_set_sPLT() that may cause an application using libpng to read out of bounds, resulting in a crash.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:209
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : libpng
 Date    : November 16, 2006
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Buffer overflow in the png_decompress_chunk function in pngrutil.c in
 libpng before 1.2.12 allows context-dependent attackers to cause a
 denial of service and possibly execute arbitrary code via unspecified
 vectors related to "chunk error processing," possibly involving the
 "chunk_name". (CVE-2006-3334)

 It is questionable whether this issue is actually exploitable, but the
 patch to correct the issue has been included in versions < 1.2.12.

 Tavis Ormandy, of the Gentoo Linux Security Auditing Team, discovered a
 typo in png_set_sPLT() that may cause an application using libpng to
 read out of bounds, resulting in a crash. (CVE-2006-5793)

 Packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 45ad162b09535faffbcac12958fe49b6  2006.0/i586/libpng3-1.2.8-1.2.20060mdk.i586.rpm
 d606c712b0fe3cb2846aa6e7d055e734  2006.0/i586/libpng3-devel-1.2.8-1.2.20060mdk.i586.rpm
 2205db07f1fd59257fa7eada8c8f695d  2006.0/i586/libpng3-static-devel-1.2.8-1.2.20060mdk.i586.rpm 
 7b6c834aaf600fc44a64fa08cdd6961f  2006.0/SRPMS/libpng-1.2.8-1.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 f977af66ce569366e9a44e4c1a73b715  2006.0/x86_64/lib64png3-1.2.8-1.2.20060mdk.x86_64.rpm
 878c585798862bd39a27422252573213  2006.0/x86_64/lib64png3-devel-1.2.8-1.2.20060mdk.x86_64.rpm
 4220979712677c242d3e203650ff5236  2006.0/x86_64/lib64png3-static-devel-1.2.8-1.2.20060mdk.x86_64.rpm 
 7b6c834aaf600fc44a64fa08cdd6961f  2006.0/SRPMS/libpng-1.2.8-1.2.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 9906d24fb91a92049217263cf0128bfc  2007.0/i586/libpng3-1.2.12-2.2mdv2007.0.i586.rpm
 2d8452c09aca5596b29a1392aa250f2e  2007.0/i586/libpng3-devel-1.2.12-2.2mdv2007.0.i586.rpm
 38829f47379a45ecfcc9061078b24489  2007.0/i586/libpng3-static-devel-1.2.12-2.2mdv2007.0.i586.rpm 
 503559d5befe0d3b557422359ca2cb7a  2007.0/SRPMS/libpng-1.2.12-2.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 1a51b7fe5aabda61d420a573e5fe240e  2007.0/x86_64/lib64png3-1.2.12-2.2mdv2007.0.x86_64.rpm
 bb66b6392ad998e1e697c9cb1171687b  2007.0/x86_64/lib64png3-devel-1.2.12-2.2mdv2007.0.x86_64.rpm
 232a26557eb1069284ed5ada81492221  2007.0/x86_64/lib64png3-static-devel-1.2.12-2.2mdv2007.0.x86_64.rpm 
 503559d5befe0d3b557422359ca2cb7a  2007.0/SRPMS/libpng-1.2.12-2.2mdv2007.0.src.rpm

 Corporate 3.0:
 881d961819f17791dd2348c2b38153f7  corporate/3.0/i586/libpng3-1.2.5-10.7.C30mdk.i586.rpm
 87b087c74ba0466ee6a6aa487c6d7159  corporate/3.0/i586/libpng3-devel-1.2.5-10.7.C30mdk.i586.rpm
 5ae5cb1afdf63d50292a0d309f2789da  corporate/3.0/i586/libpng3-static-devel-1.2.5-10.7.C30mdk.i586.rpm 
 3ed80f4657a551ebfff3cb87912ee8bc  corporate/3.0/SRPMS/libpng-1.2.5-10.7.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 2ab9e03623fb035928ba711818742bd3  corporate/3.0/x86_64/lib64png3-1.2.5-10.7.C30mdk.x86_64.rpm
 dd2480239ee424f20a460fa2a087fcdf  corporate/3.0/x86_64/lib64png3-devel-1.2.5-10.7.C30mdk.x86_64.rpm
 43ea6b6e435e31978bc54495972e2828  corporate/3.0/x86_64/lib64png3-static-devel-1.2.5-10.7.C30mdk.x86_64.rpm 
 3ed80f4657a551ebfff3cb87912ee8bc  corporate/3.0/SRPMS/libpng-1.2.5-10.7.C30mdk.src.rpm

 Corporate 4.0:
 27c277f505d08abde9ba7ef6ec17123e  corporate/4.0/i586/libpng3-1.2.8-1.2.20060mlcs4.i586.rpm
 dc70e227da5ec0514d5056319f336076  corporate/4.0/i586/libpng3-devel-1.2.8-1.2.20060mlcs4.i586.rpm
 6d267d5422d0e3e9e2868398ed1c8864  corporate/4.0/i586/libpng3-static-devel-1.2.8-1.2.20060mlcs4.i586.rpm 
 462209b43657d92d6468b161eb779911  corporate/4.0/SRPMS/libpng-1.2.8-1.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 090b1f0b32a0b980681b35c8aec5f323  corporate/4.0/x86_64/lib64png3-1.2.8-1.2.20060mlcs4.x86_64.rpm
 96f0df2464cc042fc9fabfd3b1304d7a  corporate/4.0/x86_64/lib64png3-devel-1.2.8-1.2.20060mlcs4.x86_64.rpm
 818a20ce635900040bc7ff3a1b330e38  corporate/4.0/x86_64/lib64png3-static-devel-1.2.8-1.2.20060mlcs4.x86_64.rpm 
 462209b43657d92d6468b161eb779911  corporate/4.0/SRPMS/libpng-1.2.8-1.2.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 c2faf16ec4411b18adf61729e8cc285e  mnf/2.0/i586/libpng3-1.2.5-10.7.M20mdk.i586.rpm
 52c3ea1ea57c1574d66bc62dab0b3df6  mnf/2.0/i586/libpng3-devel-1.2.5-10.7.M20mdk.i586.rpm
 ba313a457f4647177ad33ba7fab48d4e  mnf/2.0/i586/libpng3-static-devel-1.2.5-10.7.M20mdk.i586.rpm 
 9cb65939c4d3165b2c806ae5b64cab08  mnf/2.0/SRPMS/libpng-1.2.5-10.7.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFXLdcmqjQ0CJFipgRAhDYAJ92K8724DBC+sLsJIxWCpyMCb32rACcDd5R
sgDMNY3YOYC5pPDKaAoviMM=
=vlRo
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F48443)

rPSA-2006-0133-1.txt (PacketStormID:F48443)
2006-07-24 00:00:00
 
advisory,web,denial of service
CVE-2006-3334
[点击下载]

rPath Security Advisory - Previous versions of the libpng package contain a weakness in processing images that is known to create a denial of service vulnerability and is expected also to allow unauthorized access. This weakness is triggered by malformed png images that may be provided to applications such as web browsers by an attacker.

rPath Security Advisory: 2006-0133-1
Published: 2006-07-19
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
    User Non-deterministic Unauthorized Access
Updated Versions:
    libpng=/conary.rpath.com@rpl:devel//1/1.2.12-2-0.1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334
    https://issues.rpath.com/browse/RPL-517

Description:
    Previous versions of the libpng package contain a weakness in
    processing images that is known to create a denial of service
    vulnerability and is expected also to allow unauthorized access.
    This weakness is triggered by malformed png images that may be
    provided to applications such as web browsers by an attacker.
    

- 漏洞信息

28160
libpng png_decompress_chunk Function Off-By-Two Overflow
Context Dependent Input Manipulation
Loss of Integrity Upgrade
Exploit Unknown Vendor Verified

- 漏洞描述

libpng contains an off-by-two overflow condition in the 'png_decompress_chunk()' function [pngrutil.c]. The issue is triggered as chunk_name entries in PNG images are not properly validated when handling chunk errors. With a specially crafted PNG file, a context-dependent attacker can cause a limited stack-based buffer overflow, resulting in a denial of service or potentially execution of arbitrary code.

- 时间线

2006-06-27 Unknow
Unknow 2006-06-02

- 解决方案

Upgrade to version 1.0.20, 1.2.11beta2, 1.2.12 or higher, as they have been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Libpng Graphics Library Chunk Error Processing Buffer Overflow Vulnerability
Boundary Condition Error 18698
Yes Yes
2006-06-28 12:00:00 2008-12-15 04:31:00
The vendor disclosed this vulnerability.

- 受影响的程序版本

Turbolinux Turbolinux Server 10.0 x86
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Server 10.0.0 x64
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux 10 F...
TurboLinux Personal
TurboLinux Multimedia
Turbolinux Home
Turbolinux FUJI 0
Turbolinux Appliance Server 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise Desktop 10
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 10
OpenPKG OpenPKG 2.5
OpenPKG OpenPKG 2.4
OpenPKG OpenPKG 2.3
OpenPKG OpenPKG 2.2
OpenPKG OpenPKG 2.1
OpenPKG OpenPKG 2.0
OpenPKG OpenPKG Current
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 2007.0 x86_64
Mandriva Linux Mandrake 2007.0
MandrakeSoft Multi Network Firewall 2.0
MandrakeSoft Corporate Server 4.0 x86_64
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
MandrakeSoft Corporate Server 4.0
libpng libpng3 1.2.11
libpng libpng3 1.2.10
libpng libpng3 1.2.8
+ Slackware Linux 10.2
+ Slackware Linux 10.1
+ Slackware Linux 10.1
+ Trustix Secure Linux 3.0.5
+ Trustix Secure Linux 3.0
+ Trustix Secure Linux 2.2
libpng libpng3 1.2.7
+ Trustix Secure Enterprise Linux 2.0
libpng libpng3 1.2.6
libpng libpng 1.0.17
libpng libpng 1.0.16
Gentoo Linux
Apple Mac OS X Server 10.5.2
Apple Mac OS X 10.5.2
libpng libpng3 1.2.12
+ Slackware Linux 11.0

- 不受影响的程序版本

libpng libpng3 1.2.12
+ Slackware Linux 11.0

- 漏洞讨论

The 'libpng' graphics library is reported prone to a buffer-overflow vulnerability. The library fails to perform proper bounds checking of user-supplied input before copying it to an insufficiently sized memory buffer.

This vulnerability may be exploited to execute attacker-supplied code in the context of an application that relies on the affected library.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

The vendor has released libpng 1.2.12 to address this issue.

Please see the referenced vendor advisories for details on obtaining and applying fixes.


Mandriva Linux Mandrake 2007.0

MandrakeSoft Corporate Server 4.0

libpng libpng 1.0.16

libpng libpng 1.0.17

libpng libpng3 1.2.10

libpng libpng3 1.2.11

libpng libpng3 1.2.6

libpng libpng3 1.2.7

libpng libpng3 1.2.8

Apple Mac OS X 10.5.2

Apple Mac OS X Server 10.5.2

Mandriva Linux Mandrake 2006.0

MandrakeSoft Corporate Server 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站