Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libpng | Greg_roelofs | * | 1.2.5 (including) |
Msn_messenger | Microsoft | 6.1 (including) | 6.1 (including) |
Msn_messenger | Microsoft | 6.2 (including) | 6.2 (including) |
Windows_media_player | Microsoft | 9 (including) | 9 (including) |
Windows_messenger | Microsoft | 5.0 (including) | 5.0 (including) |
Red Hat Enterprise Linux 2.1 | RedHat | galeon | * |
Red Hat Enterprise Linux 3 | RedHat | libpng-2:1.2.2-25 | * |
Red Hat Enterprise Linux 3 | RedHat | libpng10-0:1.0.13-15 | * |
Red Hat Enterprise Linux 3 | RedHat | mozilla | * |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Libpng | Ubuntu | dapper | * |
Libpng | Ubuntu | devel | * |
Libpng | Ubuntu | edgy | * |
Libpng | Ubuntu | feisty | * |
Libpng3 | Ubuntu | dapper | * |
Libpng3 | Ubuntu | edgy | * |