Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libpng | Greg_roelofs | * | 1.2.5 (including) |
Msn_messenger | Microsoft | 6.1 (including) | 6.1 (including) |
Msn_messenger | Microsoft | 6.2 (including) | 6.2 (including) |
Windows_media_player | Microsoft | 9 (including) | 9 (including) |
Windows_messenger | Microsoft | 5.0 (including) | 5.0 (including) |